Identification and Development of E-Contents about Information Security in Nursing

Authors

  • Sara Rošeto
  • Patrik Pucer
  • Irena Trobec
  • Boštjan Žvanut

Keywords:

e-learning, nursing care, information security, risk

Abstract

In everyday nursing practice it is possible to identify different threats to the violation of information security. The goal of this study was to identify some of the most problematic activities in the particular health institution and develop e-learning contents for nurses, which would present the problems of information security to this population in an appropriate way. The aforementioned threats were identified in the literature and with interviews, performed with two health informatics experts. According to five different identified threats, wedeveloped e-learning contents, which vividly present the aforementioned violations and potential consequences. For the development of e-contents the applications Bitstrip and Courselab 2.4 and the learning management system Moodle were used. E-contents were evaluated by one of the interviewee and a university lecturer expert in field of informatics. The results of the evaluation indicate that the developed e-contents are useful, on an adequate level of quality and appropriate for the target population. The lack of nurses’ knowledge in the field of information security represents a threat for reliability and data protection. The developed e-contents could improve the situation in this field.

References

Albarrak, A. (2012). Information security behavior among nurses in an academic hospital. HealthMED, št. 6, str. 2349–2354.

Gobuty, D. E. (2003). Organizing security and privacy enforcement in medical imaging technology. Int. Congr. Ser., CARS 2003. Computer Assisted Radiology and Surgery. Proceedings of the 17th International Congress and Exhibition 1256, str. 319–329.

Green, M. D. and Rubin, A. D. (2011). A research roadmap for healthcare IT security inspired by the PCAST health information technology report, in: Proceedings of the 2nd USENIX Conference on Health Security and Privacy. USENIX Association, San Francisco, CA, str. 5.

IT Governance Institute (2007). COBIT. IT Governance Institute, Rolling Meadows, IL.

Kač, L., Kreuh, N. in Mohorčič, G. (2011). Izhodišča za izdelavo e-učbenikov - elektronski vir, 2. izd. Ljubljana: Zavod Republike Slovenije za šolstvo.

Leino-Kilpi, H., Välimäki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A. and Arndt, M. (2001). Privacy: a review of the literature. International Journal of Nursing Studies, št. 38, str. 663–671.

Linden, H. van der, Kalra, D., Hasman, A. and Talmon, J. (2009). Inter-organizational future proof EHR systems. A review of the security and privacy related issues. International Journal of Medical Informatics, št. 78, str. 141–160.

Marcelan, N. in Bernik, I. (2012). Varnost in zagotavljanje zasebnosti bolnišničnih podatkov o pacientih. V: Bernik, I. in Meško, G. (ur.), Zbornik prispevkov/ Konferenca Informacijska varnost: odgovori na sodobne izzive, Ljubljana, 20. 1. 2012. Pridobljeno dne 27. 5. 2014 s svetovnega spleta: http://www.fvv.uni-mb.si/konferencaIV/zbornik.html.

Prijatelj, V. (2006). Opportunities and obstacles in electronic data collection in nursing. Studies in health technology and informatics, št. 122, str. 329–332.

Rajkovič, U. (2010). Sistemski pristop k oblikovanju e-dokumentacije zdravstvene nege.

Spletna stran Bitstrips, n. d. Bitstrips - Comics starring YOU and your Friends. Pridobljeno dne 27. 5. 2014 s svetovnega spleta: http://www.bitstrips.com/.

Trček, D., Trobec, R., Pavešić, N. and Tasič, J. F. (2007). Information systems security and human behaviour. Behav. Information Technology, št. 26, str. 113–118.

Published

2022-04-09

Issue

Section

Articles

How to Cite

Identification and Development of E-Contents about Information Security in Nursing. (2022). Revija Za Zdravstvene Vede, 2(1), 75-87. https://www.jhs.si/index.php/JHS/article/view/25

Most read articles by the same author(s)