JHIM Volume 17, Number 3: Security

View an archived issue from JHIM, Volume 17, Number 3: Security

The Journal of Healthcare Information Management (JHIM) is a HIMSS Member Benefit. To access archived issues prior to Volume 22 (2008), you must login to your HIMSS account. To access issues after Volume 21 (Fall 2007), you must login via the JHIM Digital Site. If you are not currently a HIMSS Member, please join now!

Volume 17, Number 3: Summer 2003

Table of Contents

Focus: Security

EDITOR'S INTRODUCTION: IT Security: An Elusive Requirement
Richard D. Lang, EdD

LEADERSHIP: Information Security Strategy: Questions You Wish the CEO Would Ask
John B. Ennis, FHIMSS

Rising to the Challenge: Strategies for the New Healthcare Enterprise
Noam H. Arzt, PhD

The Story on Security: Stay Tuned for Details...
Jeffrey C. Bauer, PhD

SECURITY: Best Practices for Compliance with the Final Security Rule
Tom Walsh, CISSP

LEGAL: Legal Protections Related To Security Concerns
Diana J.P. McKenzie and Milton L. Petersen

GOVERNMENT/REGULATION: A Call to Arms: Why the NHII is Critical to our Nation's Security
Dave Roberts, MPA, FHIMSS

THE PHYSICIAN PERSPECTIVE: Life After Go-Live, Part 3: Struggling with Structure
Eric Rose, MD

TECHNOLOGY: The Role of Technology in Biodefense
Richard Krohn, MA, MAS

INDUSTRY LEADERS: An Interview with SAIC Health Solutions Chief Technology Officer Dixie Baker

Focus: Security

Rightsizing HIPAA Security Compliance for Smaller Organizations
Paul E. Proctor, Nick Davis, and Barbara Rosenblum

EMR Confidentiality and Information Security
Gary Kurtz, FHIMSS

Strategies for Complying with the HIPAA Security Rule
Ann Pelletier, Susan A. Bresee, and Jeffrey R. Hill, MS

The Informatics Nurse Specialist as Privacy Officer
Nancy P. Malloy, RN, MS

Features

An Integrated Business Approach to Process Improvement and HIPAA Compliance
Paul R. Vegoda, FHIMSS, and Carl N. Abramson

Herding Cats: The Challenges of EMR Vendor Selection
Samuel W. McDowell, PhD, Regi Wahl, and James Michelson, MD