IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security in Electronic Medical Records: A Case Study with the User in Focus

Information Security in Electronic Medical Records: A Case Study with the User in Focus
View Free PDF
Author(s): Rose-Mharie Åhlfeldt (University of Skövde, Sweden) and Lena Ask (University of Skövde, Sweden)
Copyright: 2004
Pages: 3
Source title: Innovations Through Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-261-9.ch088
ISBN13: 9781616921255
EISBN13: 9781466665347

Abstract

Healthcare manages a large amount of information, which represented in different forms is a necessity for the healthcare work. Furthermore, security is an obvious requirement for almost everything one does in healthcare. Information are available quicker and easier by means of modern information technology (IT) but IT also entails new demands on information security awareness. It is obvious, from different sources and earlier work in this area, that user behavior is one of the most important reasons for present shortcomings in information security. This paper reports on experiences from a case study at a hospital in southwestern Sweden. The aim with the work was to determine how users, using electronic medical records (EMR), are affected by the requirements of information security, how they affect the information security, and how they obey the recommendations and common advice for processing of personal data compiled by the Swedish Data Inspection Board. The result from this work shows that users are indeed affected by, and affect the requirements of information security. This is due to, above all, insufficient knowledge about information security, but also because security policies and routines in the organization are inadequate. Consequently, users are still a critical factor when information security measures are applied in healthcare.

Body Bottom