Influence of HIPAA on Information Security Governance
Running head: ANNOTATED BIBLIOGRAPHY: INFLUNECE OF HIPAA ON 2
ANNOTATED BIBLIOGRAPHY: INFLUENCE OF HIPAA ON 2
INFLUENCE OF HIPAA ON INFORMATION SECURITY GOVERNANCE
SAI ABHISHEK SOMAGOUNI
UNIVERSITY OF CUMBERLANDS
Annotated Biblography: Influence of HIPAA on Information Security Governance
Noyes, C. (July,2011). Information Security Policies and Governance to Safeguard Protected Health Information. Retrieved on Nov 1,2019 from https://pdfs.semanticscholar.org/bc4d/9e5ea7ad36655a5b74d2f257ed638240bbc2.pdf
- This article is credible since it was published in a well-established peer reviewed journal. Christi Noyes (Business Analyst at University of Arizona). Published by University of Arizona and approved by Dr. Linda F. Ettinger (Senior Academic Director of the University)
- This article’s relevance is supported by its recent publication on July 2011.
- This article addresses policies and describes information security governance strategies designed to ensure compliance. Organizations must create a leadership committee to assess current policies, oversee policy enforcement, note the effects of internal and external influences, and maintain currency.
- This article will be used to write the updated rules which are used for current information security governance.
Newman, T. & Kreick, J. (2015). The Impact of HIPAA on Wearable Technology. 18 SMU Sci. & Tech. L. Rev. 429. Retrieved from https://scholar.smu.edu/cgi/viewcontent.cgi?article=1027&context= scitech
- This article is credible since it was published in a well-established peer reviewed journal. Newman, T. & Kreick, J. both are attorneys at Haynes and Boone, LLP in Dallas, TX. Published by Southern Methodist University Dallas, Texas.
- This article’s relevance is supported by its recent publication on July 2015.
- This article discusses what happens when the information that wearable technologies now-a-days collects is shared with health care providers? Do our devices now have to comply with the U.S. Health Insurance Portability and Accountability Act (HIPAA)? This article explores the impact of HIPAA and other federal regulations on the health information that wearable technology and other mobile applications store and transmit and when exactly the sharing of that data and the device itself are subject to regulation.
As now, they can track and retain much information to help ordinary people take charge of their health.
- This article will be used to discuss on a very important reference on the topic of my research paper, about the influence of HIPAA on the latest technologies and its information security.
Lorence, D. P., & Churchill, R. (2005). Incremental adoption of information security in healthcare organizations: Implications for document management. IEEE Transactions on Information Technology in Biomedicine, 9(2), 169-173. doi: 10.1109/TITB.2005.847137.
- This article is credible since it was published in a well-established peer reviewed journal. Daniel P. Lorence is an Assistant Professor at Pennsylvania State University and Richard Churchill is a Senior Research Fellow at The Virtual Management Institute, Gettysburg, PA. The publications of the Institute of Electrical and Electronics Engineers (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, publishing well over 100 peer-reviewed journals.
- This article’s relevance is supported by its recent publication on July 2005
- This article examines how industry-wide knowledge management trends may influence the degree of security program adoption in health-care organizations. Results suggest that significant non adoption of mandated security measures continues to occur across the health-care industry. Paper-based systems still prevail, and computerized settings tend to have less security measures. Implications for document management and knowledge policy are discussed.
- This article will be used to discuss about computerized settings tend to have less security measures and what are the precautions to be taken using HIPAA rules.
Karasz, H. N., Eiden, A., & Bogan, S. (2013). Text messaging to communicate with public health audiences: how the HIPAA Security Rule affects practice. American journal of public health, 103(4), 617-622.
- This article is credible since it was published in a well-established peer reviewed journal. Was published by American Journal of Public Health (AJPH).
- This article’s relevance is supported by its recent publication on April 2013.
- This article deals with using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.
- This article will be used to discuss about the HIPAA Security Rules applied on the present texting world and its changes accordingly.
Toapanta, S. M. T., Paredes, S. J. M., Gallegos, L. E. M., & Trejo, J. A. O. (2018, July). Analysis of HIPAA for Adopt in the Information Security in the Civil Registry of the Ecuador. In 2018 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1-5). IEEE.
- This article is credible since it was published in a well-established peer reviewed journal. Was published by the Institute of Electrical and Electronics Engineers (IEEE). The publications of the Institute of Electrical and Electronics Engineers (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, publishing well over 100 peer-reviewed journals.
- This article’s relevance is supported by its recent publication on July 2018.
- This article was used the deductive method and exploratory research to analyze the information of the articles reviewed. A prototype of an algorithm based on the MD5 was obtained using flowchart techniques; considering the HIPAA rules. It was concluded that the adoption of a prototype in an algorithm based on the MD5 is an alternative to improve the security of the information; in view what the password stored in the database is not the password of the real user, due to the encryption, considering the HIPAA rules; this will allow to mitigate the integrity of the information in the database of the Registry Civil of the Ecuador.
- This article will be used to discuss about a prototype in an algorithm based on the MD5 is an alternative to improve the security of the information, considering the HIPAA rules.
Anderson, C. L. (2019). Data Breaches and Electronic Personal Health Information (ePHI): What Is Injury-in-Fact and Does HIPAA Set a Negligence Standard of Care? Journal of Legal Medicine, 39(3), 263-277.
- This article is credible since it was published in a well-established peer reviewed journal. Was published by American College of Legal Medicine.
- This article’s relevance is supported by its recent publication on OCT 2019.
- The article focuses on the 2018–2019 National Health Law Moot Court problem asked whether those individuals would have an injury entitling them to sue the party. It mentions Health Information Protection and Portability Act (HIPAA) supplies the standard of care in state negligence law for failing to protect the privacy of electronic personal health information (ePHI). It also mentions risk of identity theft is enough injury or that the exposure of the private information.
- This article will be used to discuss about the HIPAA supplies the standard of care in state negligence law for failing to protect the privacy of electronic personal health information (ePHI).
Yang, T. H., Ku, C. Y., & Liu, M. N. (2016). An integrated system for information security management with the unified framework. Journal of Risk Research, 19(1), 21-41.
- This article is credible since it was published in a well-established peer reviewed journal. Was published by Journal of Risk Research.
- This article’s relevance is supported by its recent publication on JAN 2016.
- The article primary goal is to design an integrated system for information security management (ISISM) that aims to use current methodologies and standards, using HIPAA rules. Because business impact analysis and risk analysis are the most important areas within this domain, we carefully select the related methods and then integrate them into a unified framework, upon which the proposed ISISM depends.
- This article will be used to discuss about the integrated system for information security management (ISISM) that aims to use current methodologies and standards, using HIPAA rules.