Health informatics management system is the interdisciplinary
study of the design, development, adoption and application of IT
based innovation in healthcare services delivery, management and
planning.
- Deals with the resources, devices and methods required to
optimize the acquisition, storage, retrieval and the use of
information in health and biomedicine.
Following are the four key factors contributing to HIMS failure
and breaches:
- Improper disclosure: Almost one third of health care security
incident involved a person abusing their use of inetrnal
resources.It can be a privilege abuse.
- Theft: 95% of security incidents with a physical care were
attributed to theft in report. Other types include snooping,
tampering and surveillance but are less common.
- Unauthorized access: Hacking incident occurs when a person
intensionally gain unauthorized access to a system or device.
- Malware: Malware software is one of the top cause of data
breaches around the world.
- Following are the three ways of HIMS failure and breached
imoacted organisation, patient operations, information, protection
privacy and personal safety:
- Motive : Both economic and non economic factors can motivate
attack on health information. Patient health records have economic
value to insurers and journalist.
- Resources: with respect to resources available to them
potential attackers can range from individuals with modest
financial and computing resources to well funded and determined
intelligence agencies.
- Initial Access: Initial access the relationship of the
attackers to the target data prior to the initiation of an assault
on some stakeholders system.
- Following are the three ways HIMS practices to avoid HIMS
failure and breaches:
- Maintain HIPPA compliance and PHI security:. HIMS play an
important role in managing the flow of health care informatics. It
is regulated by HIPPA which orovide specific rules for the
safeguarding of medical information.
- Protection from outside: Cyber attacks are a growing threat
across all industries. The attacks can take a variety of forms,
cybe security threat more common in health care include - malware,
ransom ware, phishing attacks . HIMS work to combat these threats
by advocating for proper solution.
- Influencing standard and laws: Rules and regulations related to
HIMS are created at state and federal level to protect
throughout.
- One current organisation to prevent breaches is HIPPA
- Following are the four current resources:
- A study was conducted by Nelson on health informatics. ( Nelson
R. Helath informatics: Interprofessional apperent.2016).
- A study was conducted on modulation of patient records from
paper to electronic media and changes the way dtat is used.( Fenton
SH. Health information management: Change with time .2017.Yearb Med
Inform.72-77)
- Bloomrosen M. Finding from 2017 on the HIM.2018. Yearb amed
Informs: 67-73).
- Bradley P. Trying together CDI, ICD-10and health care data
analytics: How CDI program and ICD-10 are impacting Data Analytics
and the benefit to healthcare.2016.J AHIMA: 28-30.