Close Notification

Your cart does not contain any items



We can order this in for you
How long will it take?


CRC Press
18 September 2018
Health systems & services; Network management
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it's a question of will you be ready.

BYOD for Healthcare provides authoritative guidance to help you thrive during the healthcare BYOD (hBYOD) revolution. Jessica Keyes, president of New Art Technologies, Inc., professor at the University of Liverpool, and former managing director of R&D for the New York Stock Exchange, supplies an understanding of these new end users, their demands, and the strategic and tactical ramifications of these demands.

Maintaining a focus on the healthcare industry, the book considers the broad range of technical considerations, including selection, connectivity, training, support, and security. It examines the integration of BYOD to current health IT, legal, regulatory, and ethical issues. It also covers risk assessment and mitigation strategies for an hBYOD environment that are in line with medical laws, regulations, ethics, and the HIPAA and HITECH Acts.

The text discusses BYOD security and provides time-saving guidance on how to configure your hBYOD environment. It also considers how BYOD impacts resource management, certification of EMR/EHR software, health informatics, and health information exchange.

The book covers content and data management, risk assessment, and performance measurement and management. It includes a set of Quick Start guides with tips for assessing costs, cloud integration, and legal issues. It also contains a robust appendix with information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.
By:   Jessica Keyes (New Art Technologies Monroe Township New Jersey USA)
Imprint:   CRC Press
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm, 
Weight:   844g
ISBN:   9781138382220
ISBN 10:   1138382221
Pages:   454
Publication Date:   18 September 2018
Audience:   College/higher education ,  Primary
Format:   Paperback
Publisher's Status:   Active
The BYOD Revolution Adapted to Health Information Technology Meaningful Use The Possibility of hBYOD What is in it for the Organization So What can go Wrong? Mobile Device Management Consumerization of IT Business as Usual Making a Financial Case for BYOD Supporting BYOD Cost-Benefit Analysis Break-Even Analysis Estimating ROI for an IT Project Earned-Value Management Rapid Economic Justification Value Measuring Methodology Step 1: Develop a Decision Framework Task 1-Identify and Define the Value Structure Task 2-Identify and Define Risk Structure Task 3-Identify and Define the Cost Structure Task 4-Begin Documentation Step 2: Alternative Analysis-Estimate Value, Costs, and Risk Task 1-Identify and Define Alternatives Task 2-Estimate Value and Cost Task 3-Conduct Risk Analysis Task 4-Ongoing Documentation Step 3: Pull Together the Information Task 1-Aggregate the Cost Estimate Task 2-Calculate the ROI Task 3-Calculate the Value Score Task 4-Calculate the Risk Scores Task 5-Compare the Value, Cost, and Risk Step 4: Communicate and Document Task 1-Communicate the Value to Customers and Stakeholders Task 2-Prepare Budget Justification Documents Task 3-Satisfy Ad Hoc Reporting Requirements Task 4-Use Lessons Learned to Improve Processes Uncertainty Analysis Sensitivity Analysis Glossary Integrating hBYOD into Performance Measurement and Management Systems Measuring BYOD Why Measure? Understanding Performance Management Attributes of Successful Performance Measurement Systems Developing Benchmarks Using Balanced Scorecard to Measure BYOD Effectiveness Representative IT Balanced Scorecard Value Metrics Keeping Track of What is going on Validation and Verification Assessment and Mitigation of Risks in an hBYOD Environment What is a Risk Analysis? Initiating the Risk Assessment A Typical Organization's Computer System System Architecture System Operational Authority/Ownership Threats to a Typical Organization's Assets Current Security Measures COG Contingency Planning Divisional Contingency Planning Protection Against Network-Related Threats Vulnerabilities Reported by the Risk Assessment Team Recommendations for Mitigating the Identified Vulnerabilities Summary Guidelines for Managing and Securing Mobile Devices in the Health Organization HIPPA Security Rule Mobile Device Overview High-level Threats and Vulnerabilities Use of Untrusted Mobile Devices and Networks Use of Applications Created by Unknown Parties Interaction with Other Systems Use of Untrusted Content Use of Location Services Technologies for Mobile Device Management Components and Architectures Capabilities Security for the Life Cycle of Enterprise Mobile Device Solution Initiation Development Implementation Operations and Maintenance Disposal Cloud Best Practices Selecting a Cloud Service CSP and End-User Agreements TOS Agreements Nondisclosure Agreements Service-Level Agreements Terms and Definitions Measuring SLA Performance SLA Enforcement Mechanisms CSP, Organization, and Integrator Roles and Responsibilities Contracting with Integrators Clearly Defined Roles and Responsibilities Standards Security Continuous Monitoring Incident Response Key Escrow Forensics Audit Logs Privacy Impact Assessments Data Location Breach Response Configuration Management in a BYOD Environment CM and Process Improvement Measurement and Metrics Benefits of BYOD CM CM Components Configuration Identification Configuration Change Control Configuration Status Accounting Configuration Auditing Implementing CM in the Organization Manage the Risks of CM CM and Data Management Document Identification Data Status Level Management Data and Product Configuration Relationships Data Version Control Digital Data Transmittal Data Access Control Content Management for hBYOD Enterprise Information Management Content Management System DMS/Electronic DMS Records Management System Digital Asset Management Mobile Device Management and Mobile Content Management Integrating hBYOD into Resource Management Data Management Roles Data Management Responsibilities Guidelines Dictionary of Data Management Terms BYOD Means Social Networking Tools that Provide Networking Capabilities Wikis in Action Meaning-Based Computing Semantic Web Virtual Worlds KM Tools Mashups Getting a Quick Start on hBYOD Quick Start 1: Software-Based Authentication Procedures/Issues/Polices Quick Start 2: BYOD- Making IT Work for Your Firm Procedures/Issues/Polices Quick Start 3: Software Selection from Multiple Packages Procedures/Issues/Polices Quick Start 4: The Make-Buy Decision Procedures/Issues/Polices Quick Start 5: IEEE Framework for Measures Procedures/Issues/Policies Quick Start 6: Common BYOD Mistakes Procedures/Issues/Polices Quick Start 7: BYOD Corporate Policy Procedures/Issues/Polices Quick Start 8: MDM Functionality Guide Procedures/Issues/Polices Quick Start 9: Legal Issues with BYOD Procedures/Issues/Polices The Fixes: How to Inoculate Your Company against Potential Legal Trouble Quick Start 10: Managing Online Content Checklist Procedures/Issues/Polices General Content Management Issues Quick Start 11: Selecting a Content Management System Checklist Procedures/Issues/Polices Before You Start Determining Project Goals and Targets Determining and Documenting Business Requirements Producing Documentation Evaluating and Selecting a Content Management System Quick Start 12: BYOD Lessons Learned Procedures/Issues/Polices Each Unique Survey ... Survey ... Survey Clarity Each and Every Platform should be IT's BFF The App Store Problem Virtualization: Might It Be a Temporary Savior? Quick Start 13: BYOD Risks Procedures/Issues/Polices Quick Start 14: Getting Started with BYOD Procedures/Issues/Polices Quick Start 15: BYOD Security Tips Procedures/Issues/Polices Quick Start 16: Cloud Migration Tips Procedures/Issues/Polices Quick Start 17: Hitching Your Network to BYOD Procedures/Issues/Polices Appendices: Security Glossary Employee Mobile Device Agreement Mobile Device Security Checklist Security Configuration Recommendations for Apple iOS 5 Devices Traditional IT Metrics Reference Cloud Procurement Questions Computer Use Policy Benchmarking Data Collection Methods Wireless Device Agreement Mobile Device Management Vendors Best Practices Security Checklist Health Information Technology Glossary Security Rule Index

Jessica Keyes is president of New Art Technologies, Inc., a high technology and management consultancy and development firm started in New York in 1989. Keyes has given seminars for such prestigious universities as Carnegie Mellon, Boston University, University of Illinois, James Madison University, and San Francisco State University. She is a frequent keynote speaker on the topics of competitive strategy and productivity and quality. She is former advisor for DataPro, McGraw-Hill's computer research arm, as well as a member of the Sprint Business Council. Keyes is also a founding Board of Director member of the New York Software Industry Association. She completed a 2-year term on the Mayor of New York City's Small Business Advisory Council. She currently facilitates doctoral and other courses for the University of Phoenix and is a member of the Faculty Council for the College of Information Systems and Technology. She has been the editor for WG&L's Handbook of eBusiness and CRC Press' Systems Development Management and Information Management. Prior to founding New Art, Keyes was managing director of R&D for the New York Stock Exchange and has been an officer with Swiss Bank Co. and Banker's Trust, both in New York City. She holds a master of business administration from New York University and a doctorate in management. A noted columnist and correspondent with over 200 articles published, Keyes is the author of the following books: The New Intelligence: AI in Financial Services, Harper Business, 1990 The Handbook of Expert Systems in Manufacturing, McGraw-Hill, 1991 Infotrends: The Competitive Use of Information, McGraw-Hill, 1992 The Software Engineering Productivity Handbook, McGraw-Hill, 1993 The Handbook of Multimedia, McGraw-Hill, 1994 The Productivity Paradox, McGraw-Hill, 1994 Technology Trendlines, Van Nostrand Reinhold, 1995 How to Be a Successful Internet Consultant, McGraw-Hill, 1997 Webcasting, McGraw-Hill, 1997 Datacasting, McGraw-Hill, 1997 The Handbook of Technology in Financial Services, Auerbach, 1998 The Handbook of Internet Management, Auerbach, 1999 The Handbook of eBusiness, Warren, Gorham, and Lamont, 2000 The Ultimate Internet Sourcebook, Amacom, 2001 How to Be a successful Internet consultant, 2nd Ed, Amacom, 2002 Software Engineering Handbook, Auerbach, 2002 Real World Configuration Management, Auerbach, 2003 Balanced Scorecard, Auerbach, 2005 Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide, Auerbach, 2006 X Internet: The Executable and Extendable Internet, Auerbach, 2007 Leading IT Projects: The IT Manager's Guide, Auerbach, 2008 Marketing IT Products and Services, Auerbach, 2009 Implementing the Project Management Balanced Scorecard, Auerbach,2010 Social Software Engineering: Development and Collaboration with Social Networking, Auerbach, 2011 Enterprise 2.0: Social Networking Tools to Transform Your Organization, Auerbach, 2012

See Also