BYOD for Healthcare: 1st Edition (Paperback) book cover

BYOD for Healthcare

1st Edition

By Jessica Keyes

Auerbach Publications

454 pages | 29 B/W Illus.

Purchasing Options:$ = USD
New in Paperback: 9781138382220
pub: 2018-09-18
$71.00
x
Hardback: 9781482219814
pub: 2014-04-23
$95.95
x
eBook (VitalSource) : 9780429159510
pub: 2014-04-23
from $47.98


FREE Standard Shipping!

Description

With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it’s a question of will you be ready.

BYOD for Healthcareprovides authoritative guidance to help you thrive during the healthcare BYOD (hBYOD) revolution. Jessica Keyes, president of New Art Technologies, Inc., professor at the University of Liverpool, and former managing director of R&D for the New York Stock Exchange, supplies an understanding of these new end users, their demands, and the strategic and tactical ramifications of these demands.

Maintaining a focus on the healthcare industry, the book considers the broad range of technical considerations, including selection, connectivity, training, support, and security. It examines the integration of BYOD to current health IT, legal, regulatory, and ethical issues. It also covers risk assessment and mitigation strategies for an hBYOD environment that are in line with medical laws, regulations, ethics, and the HIPAA and HITECH Acts.

The text discusses BYOD security and provides time-saving guidance on how to configure your hBYOD environment. It also considers how BYOD impacts resource management, certification of EMR/EHR software, health informatics, and health information exchange.

The book covers content and data management, risk assessment, and performance measurement and management. It includes a set of Quick Start guides with tips for assessing costs, cloud integration, and legal issues. It also contains a robust appendix with information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.

Table of Contents

The BYOD Revolution Adapted to Health Information Technology

Meaningful Use

The Possibility of hBYOD

What is in it for the Organization

So What can go Wrong?

Mobile Device Management

Consumerization of IT

Business as Usual

Making a Financial Case for BYOD

Supporting BYOD

Cost–Benefit Analysis

Break-Even Analysis

Estimating ROI for an IT Project

Earned-Value Management

Rapid Economic Justification

Value Measuring Methodology

Step 1: Develop a Decision Framework

Task 1—Identify and Define the Value Structure

Task 2—Identify and Define Risk Structure

Task 3—Identify and Define the Cost Structure

Task 4—Begin Documentation

Step 2: Alternative Analysis—Estimate Value, Costs, and Risk

Task 1—Identify and Define Alternatives

Task 2—Estimate Value and Cost

Task 3—Conduct Risk Analysis

Task 4—Ongoing Documentation

Step 3: Pull Together the Information

Task 1—Aggregate the Cost Estimate

Task 2—Calculate the ROI

Task 3—Calculate the Value Score

Task 4—Calculate the Risk Scores

Task 5—Compare the Value, Cost, and Risk

Step 4: Communicate and Document

Task 1—Communicate the Value to Customers and Stakeholders

Task 2—Prepare Budget Justification Documents

Task 3—Satisfy Ad Hoc Reporting Requirements

Task 4—Use Lessons Learned to Improve Processes

Uncertainty Analysis

Sensitivity Analysis

Glossary

Integrating hBYOD into Performance Measurement and Management Systems

Measuring BYOD

Why Measure?

Understanding Performance Management

Attributes of Successful Performance Measurement Systems

Developing Benchmarks

Using Balanced Scorecard to Measure BYOD Effectiveness

Representative IT Balanced Scorecard Value Metrics

Keeping Track of What is going on

Validation and Verification

Assessment and Mitigation of Risks in an hBYOD Environment

What is a Risk Analysis?

Initiating the Risk Assessment

A Typical Organization’s Computer System

System Architecture

System Operational Authority/Ownership Threats to a Typical Organization’s Assets

Current Security Measures

COG Contingency Planning

Divisional Contingency Planning

Protection Against Network-Related Threats

Vulnerabilities Reported by the Risk Assessment Team

Recommendations for Mitigating the Identified Vulnerabilities

Summary

Guidelines for Managing and Securing Mobile Devices in the Health Organization

HIPPA Security Rule

Mobile Device Overview

High-level Threats and Vulnerabilities

Use of Untrusted Mobile Devices and Networks

Use of Applications Created by Unknown Parties

Interaction with Other Systems

Use of Untrusted Content

Use of Location Services

Technologies for Mobile Device Management

Components and Architectures

Capabilities

Security for the Life Cycle of Enterprise Mobile Device Solution

Initiation

Development

Implementation

Operations and Maintenance

Disposal

Cloud Best Practices

Selecting a Cloud Service

CSP and End-User Agreements

TOS Agreements

Nondisclosure Agreements

Service-Level Agreements Terms and Definitions

Measuring SLA Performance

SLA Enforcement Mechanisms

CSP, Organization, and Integrator Roles and Responsibilities

Contracting with Integrators

Clearly Defined Roles and Responsibilities

Standards

Security

Continuous Monitoring

Incident Response

Key Escrow

Forensics

Audit Logs

Privacy Impact Assessments

Data Location

Breach Response

Configuration Management in a BYOD Environment

CM and Process Improvement

Measurement and Metrics

Benefits of BYOD CM

CM Components

Configuration Identification

Configuration Change Control

Configuration Status Accounting

Configuration Auditing

Implementing CM in the Organization

Manage the Risks of CM

CM and Data Management

Document Identification

Data Status Level Management

Data and Product Configuration Relationships

Data Version Control

Digital Data Transmittal

Data Access Control

Content Management for hBYOD

Enterprise Information Management

Content Management System

DMS/Electronic DMS

Records Management System

Digital Asset Management

Mobile Device Management and Mobile Content Management

Integrating hBYOD into Resource Management

Data Management Roles

Data Management Responsibilities

Guidelines

Dictionary of Data Management Terms

BYOD Means Social Networking

Tools that Provide Networking Capabilities

Wikis in Action

Meaning-Based Computing

Semantic Web

Virtual Worlds

KM Tools

Mashups

Getting a Quick Start on hBYOD

Quick Start 1: Software-Based Authentication

Procedures/Issues/Polices

Quick Start 2: BYOD— Making IT Work for Your Firm

Procedures/Issues/Polices

Quick Start 3: Software Selection from Multiple Packages

Procedures/Issues/Polices

Quick Start 4: The Make-Buy Decision

Procedures/Issues/Polices

Quick Start 5: IEEE Framework for Measures

Procedures/Issues/Policies

Quick Start 6: Common BYOD Mistakes

Procedures/Issues/Polices

Quick Start 7: BYOD Corporate Policy

Procedures/Issues/Polices

Quick Start 8: MDM Functionality Guide

Procedures/Issues/Polices

Quick Start 9: Legal Issues with BYOD

Procedures/Issues/Polices

The Fixes: How to Inoculate Your Company against Potential Legal Trouble

Quick Start 10: Managing Online Content Checklist

Procedures/Issues/Polices

General

Content Management Issues

Quick Start 11: Selecting a Content Management System Checklist

Procedures/Issues/Polices

Before You Start

Determining Project Goals and Targets

Determining and Documenting Business Requirements

Producing Documentation

Evaluating and Selecting a Content Management System

Quick Start 12: BYOD Lessons Learned

Procedures/Issues/Polices

Each Unique

Survey … Survey … Survey

Clarity

Each and Every Platform should be IT’s BFF

The App Store Problem

Virtualization: Might It Be a Temporary Savior?

Quick Start 13: BYOD Risks

Procedures/Issues/Polices

Quick Start 14: Getting Started with BYOD

Procedures/Issues/Polices

Quick Start 15: BYOD Security Tips

Procedures/Issues/Polices

Quick Start 16: Cloud Migration Tips

Procedures/Issues/Polices

Quick Start 17: Hitching Your Network to BYOD

Procedures/Issues/Polices

Appendices:

Security Glossary

Employee Mobile Device Agreement

Mobile Device Security Checklist

Security Configuration Recommendations for Apple iOS 5 Devices

Traditional IT Metrics Reference

Cloud Procurement Questions

Computer Use Policy

Benchmarking Data Collection Methods

Wireless Device Agreement

Mobile Device Management Vendors

Best Practices Security Checklist

Health Information Technology Glossary

Security Rule

Index

About the Author

Jessica Keyes is president of New Art Technologies, Inc., a high technology and management consultancy and development firm started in New York in 1989. Keyes has given seminars for such prestigious universities as Carnegie Mellon, Boston University, University of Illinois, James Madison University, and San Francisco State University. She is a frequent keynote speaker on the topics of competitive strategy and productivity and quality.

She is former advisor for DataPro, McGraw-Hill’s computer research arm, as well as a member of the Sprint Business Council. Keyes is also a founding Board of Director member of the New York Software Industry Association. She completed a 2-year term on the Mayor of New York City’s Small Business Advisory Council. She currently facilitates doctoral and other courses for the University of Phoenix and is a member of the Faculty Council for the College of Information Systems and Technology. She has been the editor for WG&L’s Handbook of eBusiness and CRC Press’ Systems Development Management and Information Management.

Prior to founding New Art, Keyes was managing director of R&D for the New York Stock Exchange and has been an officer with Swiss Bank Co. and Banker’s Trust, both in New York City. She holds a master of business administration from New York University and a doctorate in management.

A noted columnist and correspondent with over 200 articles published, Keyes is the author of the following books:

The New Intelligence: AI in Financial Services, Harper Business, 1990

The Handbook of Expert Systems in Manufacturing, McGraw-Hill, 1991

Infotrends: The Competitive Use of Information, McGraw-Hill, 1992

The Software Engineering Productivity Handbook, McGraw-Hill, 1993

The Handbook of Multimedia, McGraw-Hill, 1994

The Productivity Paradox, McGraw-Hill, 1994

Technology Trendlines, Van Nostrand Reinhold, 1995

How to Be a Successful Internet Consultant, McGraw-Hill, 1997

Webcasting, McGraw-Hill, 1997

Datacasting, McGraw-Hill, 1997

The Handbook of Technology in Financial Services, Auerbach, 1998

The Handbook of Internet Management, Auerbach, 1999

The Handbook of eBusiness, Warren, Gorham, and Lamont, 2000

The Ultimate Internet Sourcebook, Amacom, 2001

How to Be a successful Internet consultant, 2nd Ed, Amacom, 2002

Software Engineering Handbook, Auerbach, 2002

Real World Configuration Management, Auerbach, 2003

Balanced Scorecard, Auerbach, 2005

Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner’s Guide, Auerbach, 2006

X Internet: The Executable and Extendable Internet, Auerbach, 2007

Leading IT Projects: The IT Manager’s Guide, Auerbach, 2008

Marketing IT Products and Services, Auerbach, 2009

Implementing the Project Management Balanced Scorecard, Auerbach,2010

Social Software Engineering: Development and Collaboration with Social Networking, Auerbach, 2011

Enterprise 2.0: Social Networking Tools to Transform Your Organization, Auerbach, 2012

Subject Categories

BISAC Subject Codes/Headings:
BUS070080
BUSINESS & ECONOMICS / Industries / Service Industries
COM032000
COMPUTERS / Information Technology
MED002000
MEDICAL / Administration