American Health Information Management Association (AHIMA) (2014) Information Governance Principles for Healthcare (IGPHC). Chicago: AHIMA. Available at:
www.ahima.org/∼/media/AHIMA/Files/HIM-Trends/IG_Principles.ashx (accessed 2 May 2020).
Google Scholar
American Health Information Management Association (AHIMA) (2018) Practice Brief: Information Governance Offers a Strategic Approach for Healthcare. Chicago: AHIMA. Available at:
http://bok.ahima.org/doc?oid=302617#.XrJ4UkBuIy8 (accessed 4 May 2020).
Google Scholar
Appari, A, Johnson, ME (2010) Information security and privacy in healthcare: current state of research. International Journal of Internet and Enterprise Management 6(4): 279–314.
Google Scholar |
Crossref
Australian Commission on Safety and Quality in Health Care (ACSQHC) (2010) Australian Safety and Quality Framework for Health Care. Sydney, Australia: ACSQHC. Available at:
https://www.safetyandquality.gov.au/sites/default/files/migrated/Australian-SandQ-Framework1.pdf (accessed 4 May 2020).
Google Scholar
Australian Commission on Safety & Quality in Health Care (ACSQHC) (2018) Impact of Digital Health on the Safety and Quality of Health Care. Sydney, New South Wales: ACSQHC.
Google Scholar
Australian Digital Health Agency (ADHA) (2017) Australia’s National Digital Health Strategy. Safe, Seamless and Secure: Evolving Health and Care to Meet the Needs of Modern Australia. Canberra, Australian Capital Territory: ADHA.
Google Scholar
Australian Signals Directorate, Australian Cyber Security Centre (ACSC) (2019) Australian Government Information Security Manual. Canberra, Australian Capital Territory: Australian Government, ACSC.
Google Scholar
Australian Institute of Health and Welfare (AIHW) (2018) MyHospitals Contact Details. Canberra, Australian Capital Territory: AIHW. Available at:
https://www.myhospitals.gov.au/about-the-data/download-data (accessed 2 May 2020).
Google Scholar
Blanke, SJ, McGrady, E (2016) When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: a cybersecurity risk assessment checklist. Journal of Healthcare Risk Management 36(1): 14–24.
Google Scholar |
Crossref |
Medline
Butler, M (2018) IG pulse check: new AHIMA study measures IG adoption rates. Journal of the American Health Information Management Association 89(2): 17–21.
Google Scholar
Cisco (2019) What Is Cybersecurity? San Jose: Cisco. Available at:
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html (accessed 2 May 2020).
Google Scholar
Coventry, L, Branley, D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113: 48–52.
Google Scholar |
Crossref |
Medline
Coffey, PS, Postal, S, Houston, SM, et al. (2016) Lessons learned from an electronic health record downtime. Perspectives in Health Information Management 13(Summer): 1–7.
Google Scholar
Cohasset Associates and American Health Information Management Association (AHIMA) (2014) 2014 Information Governance in Healthcare. Benchmarking White Paper: A Call to Adopt Information Governance Practices. Minneapolis: Cohasset Associates; Chicago and Washington, DC: AHIMA.
Google Scholar
Cohen, IG, Hoffman, S, Adashi, EY (2017) Your money or your patient’s life? Ransomware and electronic health records. Annals of Internal Medicine 167(8): 587–588.
Google Scholar |
Crossref |
Medline
Commonwealth Scientific and Industrial Research Organisation (CSIRO) (2018) Future of Health: Shifting Australia’s Focus from Illness Treatment to Health and Wellbeing Management. Canberra, Australian Capital Territory: CSIRO. Available at:
https://www.csiro.au/en/Showcase/futureofhealth (accessed 2 May 2020).
Google Scholar
Downing, K (2017) AHIMA Information Governance and the Information Governance Adoption Model (IAGM™) (Presentation). Chicago: IG Advisors and AHIMA. Available at:
http://www.himconnect.ca/Documents/The%20Information%20Governance%20Adoption%20-%20AHIMA.pdf (accessed 4 May 2020).
Google Scholar
Gartner Inc . (2019) Gartner IT glossary. Stamford: Gartner Inc. Available at:
http://www.gartner.com/it-glossary/information-governance (accessed 2 May 2020).
Google Scholar
Green, D (2017) A road map for information governance implementation in healthcare. HIM-Interchange 71(1): 32–34.
Google Scholar
Health Information Management Association of Australia (HIMAA) (2017) Health Information Manager (HIM) Competency Standards, Version 3. North Ryde, Australia: HIMAA.
Google Scholar
International Federation of Health Information Management Associations (IFHIMA) (2017) Advancing Health Information Governance: A Global Imperative. Chicago: IFHIMA. Available at:
https://ifhima.org/advancing-health-information-governance-a-global-imperative/ (accessed 2 May 2020).
Google Scholar
Kadlec, L, Warner, D, Washington, L (2014) Information governance offers a strategic approach for healthcare. Journal of the American Health Information Management Association 85(10): 70–75.
Google Scholar |
Medline
Kersten, S (2013) Moving the needle toward a data-driven health care system: optimizing the EHR through information governance. Journal of Health Care Compliance 15(3): 45–46,62.
Google Scholar
Kruse, CS, Frederick, B, Jacobson, T, et al. (2017) Cybersecurity in healthcare: a systematic review of modern threats and trends. Technology and Health Care 25(1): 1–10.
Google Scholar |
Crossref |
Medline
Lee, C (2008) The preparedness of health information services for system failures due to internal disasters. Unpublished manuscript, BHthInfoManagement Honours Thesis, La Trobe University, Victoria, Australia.
Google Scholar
National Institute of Standards and Technology (NIST) (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Gaithersburg: NIST, US Department of Commerce. Available at:
https://www.nist.gov/publications/framework-improving-critical-infrastructure-cybersecurity-version-11 (accessed 2 May 2020).
Google Scholar
Office of the Australian Information Commissioner (OIAC) (2019a) Data Breach Preparation and Response: A Guide to Managing Data Breaches in Accordance with the Privacy Act 1988 (Cth). Sydney, Australia: OIAC. Available at:
https://www.oaic.gov.au/privacy/guidance-and-advice/data-breachpreparation-and-response/ (accessed 2 May 2020).
Google Scholar
Office of the Australian Information Commissioner (OIAC) (2019b) Notifiable Data Breaches Scheme 12-Month Insights Report. Sydney, Australia: OIAC. Available at:
https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-databreaches-scheme-12month-insights-report/ (accessed 2 May 2020).
Google Scholar
Perry, C (2013) Governance in health information management. HIM-Interchange 3(3): 1–5.
Google Scholar
Public Record Office Victoria (PROV) (2018) Information Management Maturity Measurement Tool. IM3 Questionnaire V1.6. Melbourne, Australia: PROV. Available at:
https://prov.vic.gov.au/recordkeeping-government/learning-resources-tools/information-management-maturity-measurement-tool-im3 (accessed 2 August 2018).
Google Scholar
Sher, M-L, Talley, PC, Cheng, T-J, et al. (2017) How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments. Health Information Management Journal 46(2): 87–95.
Google Scholar |
SAGE Journals |
ISI
Stanyon, R (2005) Information technology in health care: addressing promises and pitfalls. American Society for Health Care Risk Management Journal 25(4): 25–31.
Google Scholar |
Crossref
Spence, N, Bhardwaj, N, Paul, DP, Coustasse, A (2018) Ransomware in healthcare facilities: a harbinger of the future? Perspectives in Health Information Management 15(Summer): 1–22.
Google Scholar
Victorian Auditor-General’s Office ( VAGO) (2019) Security of Patients’ Hospital Data. Independent assurance report to Parliament, 2018-19: 23. Melbourne, Australia: Victorian Government Printer.
Google Scholar
留言 (0)