IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations

Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations
View Sample PDF
Author(s): Dawn-Marie Turner (DM Turner Informatics Consulting Inc., Canada)and Sunil Hazari (University of West Georgia, USA)
Copyright: 2007
Pages: 14
Source title: Web Mobile-Based Applications for Healthcare Management
Source Author(s)/Editor(s): Latif Al-Hakim (University of Southern Queensland, Australia)
DOI: 10.4018/978-1-59140-658-7.ch007

Purchase

View Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations on the publisher's website for pricing and purchasing information.

Abstract

Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about security and privacy of sensitive data that is prevalent in healthcare organizations. All healthcare organizations are governed by legislation and regulations, and the implementation of enterprise applications using new technology is comparatively more difficult than in other industries. Using a configuration-idiographic case-study approach, this study investigated challenges faced by two Canadian healthcare organizations. In addition to interviews with management and staff of the organizations, a walk-through was also conducted to observe and collect first-hand data of the implementation of wire-less technology in the clinical environment. In the organizations under examination, it was found that wireless technology is being implemented gradually to augment the wired network. Problems associated with implementing wireless technology in these Canadian organizations are also discussed. Because of different standards in this technology, the two organizations are following different upgrade paths. Based on the data collected, best practices for secure wireless access in these organizations are proposed.

Related Content

. © 2024. 27 pages.
. © 2024. 10 pages.
. © 2024. 13 pages.
. © 2024. 6 pages.
. © 2024. 23 pages.
. © 2024. 14 pages.
. © 2024. 7 pages.
Body Bottom