Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Medicine and Health Sciences
Developing And Validating A Healthcare Information Security Governance Framework, Rachel J. Mahncke, Patricia A. Williams
Developing And Validating A Healthcare Information Security Governance Framework, Rachel J. Mahncke, Patricia A. Williams
Research outputs 2014 to 2021
General medical practices' in Australia are vulnerable to information security threats and insecure practices. It is well accepted in the healthcare environment that information security is both a technical and a human endeavour, and that the human behaviours, particularly around integration with healthcare workflow, are key barriers to good information security practice. The Royal Australian College of General Practitioner's (RACGP) Computer and Information Security Standards (CISS) 2013 are the best practice standards for general practices, against which information security is assessed during practice accreditation. With the release of ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security …
Changing Places: The Need To Alter The Start Point For Information Security Design, Elizabeth Coles-Kemp, Patricia A. Williams
Changing Places: The Need To Alter The Start Point For Information Security Design, Elizabeth Coles-Kemp, Patricia A. Williams
Research outputs 2014 to 2021
Information security is a necessary requirement of information sharing within an electronic health system because without it confidentiality, availability, or integrity controls are absent. Research shows that the application of security in this setting is subject to workarounds partly because of resistance to security controls from clinicians who feel that their voice is excluded from the security design process. Heeks' explored the nature of health system design and referred to the distance between system designer and practitioner as the 'design-reality gap'. To reduce this gap, systems designers typically deploy usercentred, participatory approaches to design. They use various forms of consultation …