451
Views
3
CrossRef citations to date
0
Altmetric
Articles

Hospital characteristics associated with HIPAA breaches

, & ORCID Icon
Pages 171-180 | Received 18 Mar 2020, Accepted 26 Dec 2020, Published online: 23 Jan 2021

References

  • Hamilton JT. Security: Politics, humanity, and the philology of care. Princeton (NJ): Princeton University Press; 2016.
  • Gabriel MH, Noblin A, Rutherford A, et al. Data breach locations, types, and associated characteristics among US hospitals. Am J Manag Care. 2018;24(2):78–84.
  • Sittig DF, Kahol K, Singh H. Sociotechnical evaluation of the safety and effectiveness of point-of-care mobile computing devices: a case study conducted in India. Stud Health Technol Inform. 2013;192:515–519.
  • Trist EL, Bamforth KW. Some social and psychological consequences of the longwall method of coal-getting: An examination of the psychological situation and defenses of a work group in relation to the social structure and technological content of the work system. Human Relations. 1951;4(1):3–38.
  • Roberts DW. Privacy and confidentiality: the health insurance portability and accountability act in critical care nursing. AACN Adv Crit Care. 2003;14(3):302–309.
  • Solove DJ. (2013). HIPAA turns 10: analyzing the past, present, and future impact.
  • Choi YB, Capitan KE, Krause JS, et al. Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J Med Syst. 2006;30(1):57–64.
  • Adjerid I, Acquisti A, Telang R, et al. The impact of privacy regulation and technology incentives: the case of health information exchanges. Manage Sci. 2016;62(4):1042–1063.
  • De Simone DM. When is accessing medical records a HIPAA breach? J Nurs Regul. 2019;10(3):34–36.
  • Hsieh R. Improving HIPAA enforcement and protecting patient privacy in a digital healthcare environment. Loy U Chi LJ. 2014;46:175.
  • Edmunds M, Peddicord D, Frisse, ME. Ten reasons why interoperability is difficult. In Weaver C, Ball M, Kim G, et al., editors. Healthcare information management systems. Cham: Springer; 2016. p. 127–137.
  • Edemekong P, Annamaraju P, Haydel M. Health insurance portability and accountability act (HIPAA). Treasure Island (FL): StatPearls; 2020.
  • Kiel JM, Ciamacco FA, Steines BT. Privacy and data security: HIPAA and HITECH. In Weaver C, Ball M, Kim G, et al., editors. Healthcare information management systems. Cham: Springer; 2016. p. 437–449.
  • Hazard L. Is your health data really private? The need to update HIPAA regulations to incorporate third-party and non-covered entities. Catholic Univ J Law Technol. 2017;25(2):10.
  • May 2019 Healthcare Data Breach Report. (n.d.). [cited 1 Dec 2019]. Available from: https://www.hipaajournal.com/may-2019-healthcare-data-breach-report/
  • U.S. Department of Health & Human Services (HHS). [cited 8 Jan 2018]. Available from: https://www.privacyrights.org/data-breaches
  • Ness RB. Joint policy committee. influence of the HIPAA privacy rule on health research. Jama. 2007;298(18):2164–2170.
  • AMA Journal of Ethics. [cited 1 Aug 2020]. Available from: https://journalofethics.ama-assn.org/article/hitech-act-overview/2011-03
  • Peters RM. So you’ve been notified, now what: the problem with current data-breach notification laws. Ariz L Rev. 2014;56:1171.
  • Beckers Hospital Review. [cited 8 Jan 2018]. https://www.beckershospitalreview.com
  • Head ML, Holman L, Lanfear R, et al. The extent consequences of p-hacking in science. PLoS Bio. 2015;13(3):e1002106.
  • Chen JQ, Benusa A. HIPAA security compliance challenges: the case for small healthcare providers. Int J Healthc Manag. 2017;10(2):135–146.
  • Chernyshev M, Zeadally S, Baig Z. Healthcare data breaches: implications for digital forensic readiness. J Med Syst. 2019;43(1):7.
  • Sloan R, Warner R. Unauthorized access: the crisis in online privacy and security. Milton Park: Taylor & Francis; 2017. p. 401.
  • Bostrom RP, Heinen JS. MIS problems and failures: A sociotechnical perspective. part I: The causes. MIS Q. 1977;26(1):17–32.
  • Irizarry T, Barton AJ. A sociotechnical approach to successful electronic health record implementation: five best practices for clinical nurse specialists. Clin Nurse Spec. 2013;27(6):283.
  • Harteloh PPM. Quality systems in health care: a sociotechnical approach. Health Policy. 2003;64(3):391–398.
  • Kaplan B. Evaluating informatics applications—clinical decision support systems literature review. Int J Med Inform. 2001;64:15–37.
  • Berg M. Patient care information systems and healthcare work: a sociotechnical approach. Int J Med Inform. 1999;55:87–101.
  • Cresswell K, Worth A, Sheikh A. Actor-network theory and its role in understanding the implementation of information technology developments in health care. BMC Med Inform Decis Mak. 2012;12:15.
  • Cresswell KM, Worth A, Sheikh A. Integration of a nationally procured electronic health record system into user work practices. BMC Med Inform Decis Mak. 2012;12:15.
  • Rothstein MA. Is deidentification sufficient to protect health privacy in research? Am J Bioeth. 2010;10(9):3–11.
  • Healthcare Data Breach Statistics. n.d. Available from: https://www.hipaajournal.com/healthcare-data-breach-statistics/
  • Barzekar H, Karami M. Organizational factors that affect the implementation of information technology: Perspectives of middle managers in Iran. Acta Inform Med. 2014;22(5):325.
  • Cresswell KM, Sheikh A. Inpatient clinical information systems. Key Adv Clin Info. 2017: 13–29. Academic Press.
  • Mellado D, Fernández-Medina E, Piattini M. Security requirements engineering framework for software product lines. Info Soft Tech. 2010;52(10):1094–1117.
  • Boonstra A, Versluis A, Vos JF. Implementing electronic health records in hospitals: a systematic literature review. BMC Health Serv Res. 2014;14(1):370.
  • Paré G, Jaana M, Sicotte C. Exploring health information technology innovativeness and its antecedents in Canadian hospitals. Meth Infor Med. 2010;49(01):28–36.
  • Chu HL, Chiang CY. The effects of strategic hospital alliances on hospital efficiency. Ser Indust J. 2013;33(6):624–635.
  • Audi GR. Impact of multi-hospital system organizational structure on financial performance and quality of care in rural hospitals; 2014.
  • Kazley AS, Ozcan YA. Organizational and environmental determinants of hospital EMR adoption: a national study. J Med Syst. 2007;31(5):375–384.
  • Ford EW, Short JC. The impact of health system membership on patient safety initiatives. Health Care Manage Rev. 2008;33(1):13–20.
  • Koppel R, Lehmann CU. Implications of an emerging EMR monoculture for hospitals healthcare systems. J Amer Med Info Assoc. 2014;22(2):465–471.
  • Pouragha B, Zarei E. The effect of outpatient service quality on patient satisfaction in teaching hospitals in Iran. Mater Sociomed. 2016;28(1):21.
  • Shahian DM, Nordberg P, Meyer GS, et al. Contemporary performance of US teaching and nonteaching hospitals. Acad Med. 2012;87(6):701–708.
  • Welch WP. Do all teaching hospitals deserve an add-on payment under the prospective payment system. Inquiry. 1987;87(6):221–232.
  • Senot C, Chandrasekaran A, Ward PT. Role of bottom-up decision processes in improving the quality of healthcare delivery: A contingency perspective. Product Ope Manage. 2016;25(3):458–476.
  • Davis R, Davis J, Berg K, et al. Patient handoff education: are medical schools catching up? Amer J Med Qual. 2017;33(2):1062860617719128.
  • Kazley AS, Ozcan YA. Organizational and environmental determinants of hospital EMR adoption: a national study. J Med Syst. 2007;31(5):375–384.
  • Porter ME, Teisberg EO. How physicians can change the future of healthcare. Jama. 2007;297(10):1103–1111.
  • Rathert C, Porter TH, Mittler JN, et al. Seven years after meaningful use: physicians’ nurses’ experiences with electronic health records. Health Manage Rev. 2017;44(1):30–40.
  • Anthony DL, Appari A, Johnson ME. Institutionalizing HIPAA compliance: organizations and competing logics in US health care. J Health Social Behav. 2014;55(1):108–124.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.