• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

健康信息系统安全威胁生命周期:一种信息学理论。

The health information system security threat lifecycle: an informatics theory.

机构信息

Medicine, Nursing and Health Sciences, Monash University, Monash, Victoria, Australia.

出版信息

Int J Med Inform. 2009 Dec;78(12):815-26. doi: 10.1016/j.ijmedinf.2009.08.006. Epub 2009 Sep 26.

DOI:10.1016/j.ijmedinf.2009.08.006
PMID:19783203
Abstract

PURPOSE

This manuscript describes the health information system security threat lifecycle (HISSTL) theory. The theory is grounded in case study data analyzing clinicians' health information system (HIS) privacy and security (P&S) experiences in the practice context.

METHODS

The 'questerview' technique was applied to this study of 26 clinicians situated in 3 large Australian (across Victoria) teaching hospitals. Questerviews rely on data collection that apply standardized questions and questionnaires during recorded interviews. Analysis (using Nvivo) involved the iterative scrutiny of interview transcripts to identify emergent themes.

RESULTS

Issues including poor training, ambiguous legal frameworks containing punitive threats, productivity challenges, usability errors and the limitations of the natural hospital environment emerged from empirical data about the clinicians' HIS P&S practices. The natural hospital environment is defined by the permanence of electronic HISs (e-HISs), shared workspaces, outdated HIT infrastructure, constant interruption, a P&S regulatory environment that is not conducive to optimal training outcomes and budgetary constraints. The evidence also indicated the obtrusiveness, timeliness, and reliability of P&S implementations for clinical work affected participant attitudes to, and use of, e-HISs.

CONCLUSION

The HISSTL emerged from the analysis of study evidence. The theory embodies elements such as the fiscal, regulatory and natural hospital environments which impede P&S implementations in practice settings. These elements conflict with improved patient care outcomes. Efforts by clinicians to avoid conflict and emphasize patient care above P&S tended to manifest as security breaches. These breaches entrench factors beyond clinician control and perpetuate those within clinician control. Security breaches of health information can progress through the HISSTL. Some preliminary suggestions for addressing these issues are proposed.

STUDY LIMITATIONS

Legislative frameworks that are not related to direct patient care were excluded from this study. Other limitations included an exclusive focus on patient care tasks post-admission and pre-discharge from public hospital wards. Finally, the number of cases was limited by the number of participants who volunteered to participate in the study. It is reasonable to assume these participants were more interested in the P&S of patient care work than their counterparts, though the study was not intended to provide quantitative or statistical data. Nonetheless, additional case studies would strengthen the HISSTL theory if confirmatory, practice-based evidence were found.

摘要

目的

本文描述了健康信息系统安全威胁生命周期(HISSTL)理论。该理论基于案例研究数据,分析了临床医生在实践环境中使用健康信息系统(HIS)的隐私和安全(P&S)经验。

方法

本研究采用“questerview”技术,对 26 名临床医生进行了研究,这些临床医生分布在澳大利亚(维多利亚州)的 3 家大型教学医院。questerview 技术依赖于数据收集,即在记录的访谈中应用标准化问题和问卷。分析(使用 Nvivo)涉及对访谈记录的迭代审查,以确定出现的主题。

结果

从关于临床医生 HIS P&S 实践的经验数据中出现了一些问题,包括培训不足、法律框架含混不清包含惩罚性威胁、生产力挑战、可用性错误以及自然医院环境的限制。自然医院环境的定义是电子 HIS(e-HIS)的永久性、共享工作空间、过时的 HIT 基础设施、不断的中断、不利于最佳培训结果的 P&S 监管环境以及预算限制。证据还表明,P&S 实施对临床工作的侵扰性、及时性和可靠性影响了参与者对 e-HIS 的态度和使用。

结论

HISSTL 是从研究证据的分析中产生的。该理论包含了财政、监管和自然医院环境等元素,这些元素阻碍了实践环境中的 P&S 实施。这些因素与改善患者护理结果相冲突。临床医生为避免冲突并强调患者护理高于 P&S 而做出的努力往往表现为安全漏洞。这些漏洞使临床医生无法控制的因素根深蒂固,并使临床医生可以控制的因素永久化。健康信息的安全漏洞可以通过 HISSTL 进展。提出了一些初步的解决这些问题的建议。

研究限制

本研究排除了与直接患者护理无关的立法框架。其他限制包括仅关注入院后和出院前公共病房患者护理任务。最后,由于自愿参加研究的参与者人数有限,案例的数量也受到限制。可以合理地假设,与他们的同行相比,这些参与者对患者护理工作的 P&S 更感兴趣,尽管该研究并非旨在提供定量或统计数据。尽管如此,如果发现确认性的、基于实践的证据,更多的案例研究将加强 HISSTL 理论。

相似文献

1
The health information system security threat lifecycle: an informatics theory.健康信息系统安全威胁生命周期:一种信息学理论。
Int J Med Inform. 2009 Dec;78(12):815-26. doi: 10.1016/j.ijmedinf.2009.08.006. Epub 2009 Sep 26.
2
What factors are associated with the integration of evidence retrieval technology into routine general practice settings?哪些因素与将循证检索技术整合到常规全科医疗环境中有关?
Int J Med Inform. 2007 Oct;76(10):701-9. doi: 10.1016/j.ijmedinf.2006.06.009. Epub 2006 Aug 7.
3
Clinicians, security and information technology support services in practice settings--a pilot study.临床医生、医疗机构中的安全与信息技术支持服务——一项试点研究。
Stud Health Technol Inform. 2010;160(Pt 1):228-32.
4
A qualitative analysis of how advanced practice nurses use clinical decision support systems.对高级执业护士如何使用临床决策支持系统的定性分析。
J Am Acad Nurse Pract. 2007 Dec;19(12):652-67. doi: 10.1111/j.1745-7599.2007.00266.x.
5
Improving computer security by health smart card.通过健康智能卡提高计算机安全性。
Stud Health Technol Inform. 2003;95:176-81.
6
Electronic medical record systems in Israel's public hospitals.以色列公立医院的电子病历系统。
Isr Med Assoc J. 2004 Oct;6(10):583-7.
7
Dental screening and referral of young children by pediatric primary care providers.儿科初级保健提供者对幼儿进行牙科筛查和转诊。
Pediatrics. 2004 Nov;114(5):e642-52. doi: 10.1542/peds.2004-1269.
8
Standards for confidentiality, privacy, access, and data security.保密、隐私、访问和数据安全标准。
Top Health Inf Manage. 1996 May;16(4):44-8.
9
Access and privacy rights using web security standards to increase patient empowerment.利用网络安全标准保障访问和隐私权,增强患者自主权。
Stud Health Technol Inform. 2008;137:275-85.
10
The adoption of IT security standards in a healthcare environment.医疗环境中信息技术安全标准的采用。
Stud Health Technol Inform. 2008;136:765-70.

引用本文的文献

1
Designing a safety management system for higher education centers.为高等教育中心设计安全管理系统。
J Educ Health Promot. 2019 Aug 30;8:154. doi: 10.4103/jehp.jehp_373_18. eCollection 2019.
2
Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.艾滋病毒/艾滋病患者信息的安全与保密措施:越南艾滋病毒门诊工作人员的全国性调查。
PLoS One. 2017 Nov 14;12(11):e0188160. doi: 10.1371/journal.pone.0188160. eCollection 2017.
3
Managing the security of nursing data in the electronic health record.
管理电子健康记录中护理数据的安全性。
Acta Inform Med. 2015 Feb;23(1):39-43. doi: 10.5455/aim.2015.23.39-43. Epub 2015 Feb 22.
4
Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard.符合ISO/27002:2013标准的大规模PACS安全商业模式
J Digit Imaging. 2015 Aug;28(4):481-91. doi: 10.1007/s10278-014-9746-4.
5
[A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].[流动护理设施中卫生人员处理个人健康数据时信息安全的良好实践指南]
Aten Primaria. 2014 Apr;46(4):214-22. doi: 10.1016/j.aprim.2013.10.008. Epub 2014 Feb 28.
6
Laptops on trolleys: lessons from a mobile-wireless hospital ward.轮床笔记本电脑:移动无线病房的经验教训。
J Med Syst. 2012 Dec;36(6):3933-43. doi: 10.1007/s10916-012-9865-8. Epub 2012 Jul 4.