Information Technology Reference
In-Depth Information
Figure 1. HIPAA dynamic arrow framework
of the rule's implementation, lack of expertise
in security, and/or lack of HIPAA security rule
related expertise) main issues and challenges that
healthcare institutions are struggling with?
these words can be differently understood, which
may taint the data collected.
The final limitation is that Information Security
and HIPAA security rule are an ongoing process;
therefore the main factors revealed from the lit-
erature may not cover all the factors impacting the
HIPAA security rule's success or failure.
ASSUMTIONS AND LIMITATIONS
Information security is an elusive phenomenon.
One of the major limitations of this study is that
they are no known effective ways to measure IT
security in general. Subsequently, no accurate way
exists to determine or benchmark as what need to
be done to be fully compliant with HIPAA security
safeguards with respect to technical, communica-
tions, and network requirements. Many ambiguous
and imprecise words were used in the formulation
of the HIPAA security rule namely reasonableness,
appropriateness, addressable, and required which
are vague and relative to the level of awareness
and understanding of security. The meaning of
METHODOLOGY/ DESIGN
OF THE STUDY
This investigation is a quantitative, non-exper-
imental research study utilizing primary data
collected using a survey.
Population and Sampling
The populations targeted in this study were the key
IT managers and professionals such as Manage-
ment Information Systems (MIS) managers, MIS
Search WWH ::




Custom Search