Explore BrainMass
Share

Security measures for modern data management systems in the medical field

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

What are security measures used for modern data management systems in the medical field? What are some examples?

© BrainMass Inc. brainmass.com October 25, 2018, 7:22 am ad1c9bdddf
https://brainmass.com/health-sciences/health-care-management/security-measures-modern-medical-data-management-systems-500991

Solution Preview

The article "Security Practices and Regulatory Compliance" written by Dr. J. Kwon and M. E. Johnson and published in the September 6th 2012 issue of the Journal of the American Medical Informatics Association offers a good overview of this issue. According to the authors' research, the four main areas most relevant to modern data management systems in the medical field are safeguarding information, auditing processes, Human Resources management, and Third-Party agreements.

While the authors found few significant differences between ...

Solution Summary

This solution highlights some of the security measures that healthcare organizations use to protect their data management systems.

$2.19
See Also This Related BrainMass Solution

Security and the Supply Chain

Read the sources referenced on the Background page. Then, respond to the following questions:
1. Is a security-oriented culture, with respect to the supply chain, just good business? Explain.
2. What are the benefits of viewing security issues beyond the individual firm?
3. Why is RFID technology viewed by many to be an important tool in securing a supply chain?
4. Which of the 10 security competencies discussed in the Closs, Speier, Whipple, and Voss article are likely to be the most challenging to implement? Why?
Assignment Expectations:
Display an understanding of how terrorism, and other international developments, can threaten global logistics. Discuss measures that can be taken to reduce these threats.

References:
Blanchard, D. (2006 Dec.) Protecting the Global Supply Chain, Industry Week, Cleveland: Vol. 255, Iss. 12, pg. 43, 2 pgs. [ProQuest doc ID: 219748947]
Closs, D, Spier, C, Whipple, J, M. & Voss, D. (2008 Sep) A Framework for Protecting your Supply Chain, Logistics Management (2002) Highland Ranch: Vol.47, Iss. 9; pg. 45, 1 pgs. [ProQuest doc ID: 197209740]
Sheffi, Y (2001) Supply Chain Management Under the Threat of International Terrorism, International Journal of Logistics Management, Ponte Vedra Beach: Vol. 12, Iss. 2; pg. 1, 11 pgs. [ProQuest doc ID: 235866128]
Suder, G, & Czinkota, M. (2005 Fall) Towards An Understanding of Terrorism Risk in the MNE, Multinational Business Review, Detroit: Vol 13, Iss. 3, pg. 3. [ProQuest doc ID: 194181282]
Zalud, Bill, (2010 May) Every Link in the Chain, Security, Troy: Vol. 47, Iss.5; pg. 28, 3 pgs. [ProQuest doc ID: 197786976]

View Full Posting Details