Study Document
… against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational database that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed … protect it, the security needed for electronic health records, an applicable code of ethics, and proposals for training staff.
HIS Programming Language and relational database to Accommodate the Task
As Prince (2013) notes, “some programming languages are more susceptible to specific security flaws than others”—which means that some … a program that is secure; but starting with a language that can help minimize the risk of human error is preferable.
As for database, the most common database used in health care is the relational database (Campbell, 2004). These are the most commonly used because they allow for the tracking of……
References
Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.
Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637
Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.
Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement
HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from https://www.healthit.gov/providers-professionals/ehr-privacy-security
The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf
Jackson, R. (2018). Pulling strings. Retrieved from https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx
Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12. Retrieved from https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report
We have over 150,000+ study documents to help you.
Sign Up for FREE