Grounding Information Security in Healthcare

Ferreira, Ana and Antunes, Luis and Chadwick, David W. and Correi, Ricardo (2010) Grounding Information Security in Healthcare. International Journal of Medical Informatics, 79 (4). pp. 182-196. (The full text of this publication is not available from this repository)

The full text of this publication is not available from this repository. (Contact us about this Publication)
Official URL
http://dx.doi.org/10.1016/j.ijmedinf.2010.01.009

Abstract

Purpose The objective of this paper is to show that grounded theory (GT), together with mixed methods, can be used to involve healthcare professionals in the design and definition of access control policies to EMR systems. Methods The mixed methods applied for this research included, in this sequence, focus groups (main qualitative method that used grounded theory for the data analysis) and structured questionnaires (secondary quantitative method). Results Results showed that the presented methodology can be used to involve healthcare professionals in the definition of access control policies to EMR systems and explore these issues in a diversified and integrated way. The methodology allowed for the generation of great amounts of data in the beginning of the study and in a short time span. Results from the applied methodology revealed a first glimpse of the theories to be generated and integrated, with future research, into the access control policies. Conclusions The methodological research described in this paper is very rarely, if ever, applied in developing security tools such as access control. Nevertheless, it can be an effective way of involving healthcare professionals in the definition of access control policies and in making information security more grounded into their workflows and daily practices.

Item Type: Article
Uncontrolled keywords: information security; access control; access control policy; electronic medical record; grounded theory; mixed methods.
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Faculties > Science Technology and Medical Studies > School of Computing > Security Group
Depositing User: David Chadwick
Date Deposited: 21 Sep 2012 09:49
Last Modified: 08 Apr 2014 13:30
Resource URI: http://kar.kent.ac.uk/id/eprint/30670 (The current URI for this page, for reference purposes)
  • Depositors only (login required):