An investigation of the status and maturity of hospitals’ health information governance in Victoria, Australia

American Health Information Management Association (AHIMA) (2014) Information Governance Principles for Healthcare (IGPHC). Chicago: AHIMA. Available at: www.ahima.org/∼/media/AHIMA/Files/HIM-Trends/IG_Principles.ashx (accessed 2 May 2020).
Google Scholar American Health Information Management Association (AHIMA) (2018) Practice Brief: Information Governance Offers a Strategic Approach for Healthcare. Chicago: AHIMA. Available at: http://bok.ahima.org/doc?oid=302617#.XrJ4UkBuIy8 (accessed 4 May 2020).
Google Scholar Appari, A, Johnson, ME (2010) Information security and privacy in healthcare: current state of research. International Journal of Internet and Enterprise Management 6(4): 279–314.
Google Scholar | Crossref Australian Commission on Safety and Quality in Health Care (ACSQHC) (2010) Australian Safety and Quality Framework for Health Care. Sydney, Australia: ACSQHC. Available at: https://www.safetyandquality.gov.au/sites/default/files/migrated/Australian-SandQ-Framework1.pdf (accessed 4 May 2020).
Google Scholar Australian Commission on Safety & Quality in Health Care (ACSQHC) (2018) Impact of Digital Health on the Safety and Quality of Health Care. Sydney, New South Wales: ACSQHC.
Google Scholar Australian Digital Health Agency (ADHA) (2017) Australia’s National Digital Health Strategy. Safe, Seamless and Secure: Evolving Health and Care to Meet the Needs of Modern Australia. Canberra, Australian Capital Territory: ADHA.
Google Scholar Australian Signals Directorate, Australian Cyber Security Centre (ACSC) (2019) Australian Government Information Security Manual. Canberra, Australian Capital Territory: Australian Government, ACSC.
Google Scholar Australian Institute of Health and Welfare (AIHW) (2018) MyHospitals Contact Details. Canberra, Australian Capital Territory: AIHW. Available at: https://www.myhospitals.gov.au/about-the-data/download-data (accessed 2 May 2020).
Google Scholar Blanke, SJ, McGrady, E (2016) When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: a cybersecurity risk assessment checklist. Journal of Healthcare Risk Management 36(1): 14–24.
Google Scholar | Crossref | Medline Butler, M (2018) IG pulse check: new AHIMA study measures IG adoption rates. Journal of the American Health Information Management Association 89(2): 17–21.
Google Scholar Cisco (2019) What Is Cybersecurity? San Jose: Cisco. Available at: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html (accessed 2 May 2020).
Google Scholar Coventry, L, Branley, D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113: 48–52.
Google Scholar | Crossref | Medline Coffey, PS, Postal, S, Houston, SM, et al. (2016) Lessons learned from an electronic health record downtime. Perspectives in Health Information Management 13(Summer): 1–7.
Google Scholar Cohasset Associates and American Health Information Management Association (AHIMA) (2014) 2014 Information Governance in Healthcare. Benchmarking White Paper: A Call to Adopt Information Governance Practices. Minneapolis: Cohasset Associates; Chicago and Washington, DC: AHIMA.
Google Scholar Cohen, IG, Hoffman, S, Adashi, EY (2017) Your money or your patient’s life? Ransomware and electronic health records. Annals of Internal Medicine 167(8): 587–588.
Google Scholar | Crossref | Medline Commonwealth Scientific and Industrial Research Organisation (CSIRO) (2018) Future of Health: Shifting Australia’s Focus from Illness Treatment to Health and Wellbeing Management. Canberra, Australian Capital Territory: CSIRO. Available at: https://www.csiro.au/en/Showcase/futureofhealth (accessed 2 May 2020).
Google Scholar Downing, K (2017) AHIMA Information Governance and the Information Governance Adoption Model (IAGM™) (Presentation). Chicago: IG Advisors and AHIMA. Available at: http://www.himconnect.ca/Documents/The%20Information%20Governance%20Adoption%20-%20AHIMA.pdf (accessed 4 May 2020).
Google Scholar Gartner Inc . (2019) Gartner IT glossary. Stamford: Gartner Inc. Available at: http://www.gartner.com/it-glossary/information-governance (accessed 2 May 2020).
Google Scholar Green, D (2017) A road map for information governance implementation in healthcare. HIM-Interchange 71(1): 32–34.
Google Scholar Health Information Management Association of Australia (HIMAA) (2017) Health Information Manager (HIM) Competency Standards, Version 3. North Ryde, Australia: HIMAA.
Google Scholar International Federation of Health Information Management Associations (IFHIMA) (2017) Advancing Health Information Governance: A Global Imperative. Chicago: IFHIMA. Available at: https://ifhima.org/advancing-health-information-governance-a-global-imperative/ (accessed 2 May 2020).
Google Scholar Kadlec, L, Warner, D, Washington, L (2014) Information governance offers a strategic approach for healthcare. Journal of the American Health Information Management Association 85(10): 70–75.
Google Scholar | Medline Kersten, S (2013) Moving the needle toward a data-driven health care system: optimizing the EHR through information governance. Journal of Health Care Compliance 15(3): 45–46,62.
Google Scholar Kruse, CS, Frederick, B, Jacobson, T, et al. (2017) Cybersecurity in healthcare: a systematic review of modern threats and trends. Technology and Health Care 25(1): 1–10.
Google Scholar | Crossref | Medline Lee, C (2008) The preparedness of health information services for system failures due to internal disasters. Unpublished manuscript, BHthInfoManagement Honours Thesis, La Trobe University, Victoria, Australia.
Google Scholar National Institute of Standards and Technology (NIST) (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Gaithersburg: NIST, US Department of Commerce. Available at: https://www.nist.gov/publications/framework-improving-critical-infrastructure-cybersecurity-version-11 (accessed 2 May 2020).
Google Scholar Office of the Australian Information Commissioner (OIAC) (2019a) Data Breach Preparation and Response: A Guide to Managing Data Breaches in Accordance with the Privacy Act 1988 (Cth). Sydney, Australia: OIAC. Available at: https://www.oaic.gov.au/privacy/guidance-and-advice/data-breachpreparation-and-response/ (accessed 2 May 2020).
Google Scholar Office of the Australian Information Commissioner (OIAC) (2019b) Notifiable Data Breaches Scheme 12-Month Insights Report. Sydney, Australia: OIAC. Available at: https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-databreaches-scheme-12month-insights-report/ (accessed 2 May 2020).
Google Scholar Perry, C (2013) Governance in health information management. HIM-Interchange 3(3): 1–5.
Google Scholar Public Record Office Victoria (PROV) (2018) Information Management Maturity Measurement Tool. IM3 Questionnaire V1.6. Melbourne, Australia: PROV. Available at: https://prov.vic.gov.au/recordkeeping-government/learning-resources-tools/information-management-maturity-measurement-tool-im3 (accessed 2 August 2018).
Google Scholar Sher, M-L, Talley, PC, Cheng, T-J, et al. (2017) How can hospitals better protect the privacy of electronic medical records? Perspectives from staff members of health information management departments. Health Information Management Journal 46(2): 87–95.
Google Scholar | SAGE Journals | ISI Stanyon, R (2005) Information technology in health care: addressing promises and pitfalls. American Society for Health Care Risk Management Journal 25(4): 25–31.
Google Scholar | Crossref Spence, N, Bhardwaj, N, Paul, DP, Coustasse, A (2018) Ransomware in healthcare facilities: a harbinger of the future? Perspectives in Health Information Management 15(Summer): 1–22.
Google Scholar Victorian Auditor-General’s Office ( VAGO) (2019) Security of Patients’ Hospital Data. Independent assurance report to Parliament, 2018-19: 23. Melbourne, Australia: Victorian Government Printer.
Google Scholar

留言 (0)

沒有登入
gif