Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

2012

E-health

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams Jan 2012

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams

Research outputs 2012

Enterprises are faced with the task of managing a plethora of mobile computing devices in the workplace that are employed for both business purposes and private use. This integration can contribute to the demands of security protection and add significant threats to the enterprise. The introduction of the Personally Controlled Electronic Health Record (PCEHR) system is a significant step in e-health for Australia and will likely result in sensitive information being accessed from mobile computing devices. Mobile Device Management (MDM) offers a potential solution to manage these devices, however there is a variety of vendors with a range of solutions. …


Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams Jan 2012

Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams

Australian eHealth Informatics and Security Conference

Information security is a necessary requirement of information sharing in the healthcare environment. Research shows that the application of security in this setting is sometimes subject to work-arounds where healthcare practitioners feel forced to incorporate practices that they have not had an input into and with which they have not engaged with. This can result in a sense of security practitioners and healthcare practitioners being culturally very different in their approach to information systems. As a result such practices do not constitute part of their community of practice nor their identity. In order to respond to this, systems designers typically …


Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams Jan 2012

Mobile Device Management For Personally Controlled Electronic Health Records: Effective Selection Of Evaluation Criteria, Murray Brand, Patricia Williams

Australian eHealth Informatics and Security Conference

Enterprises are faced with the task of managing a plethora of mobile computing devices in the workplace that are employed for both business purposes and private use. This integration can contribute to the demands of security protection and add significant threats to the enterprise. The introduction of the Personally Controlled Electronic Health Record (PCEHR) system is a significant step in e-health for Australia and will likely result in sensitive information being accessed from mobile computing devices. Mobile Device Management (MDM) offers a potential solution to manage these devices, however there is a variety of vendors with a range of solutions. …


Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams Jan 2012

Security Specialists Are From Mars; Healthcare Practitioners Are From Venus: The Case For A Community-Of-Practice Approach To Security Architectures For Healthcare, Elizabeth Coles-Kemp, Patricia Williams

Research outputs 2012

Information security is a necessary requirement of information sharing in the healthcare environment. Research shows that the application of security in this setting is sometimes subject to work-arounds where healthcare practitioners feel forced to incorporate practices that they have not had an input into and with which they have not engaged with. This can result in a sense of security practitioners and healthcare practitioners being culturally very different in their approach to information systems. As a result such practices do not constitute part of their community of practice nor their identity. In order to respond to this, systems designers typically …