BYOD for Healthcare
BYOD for Healthcare
Click to enlarge
Author(s): Keyes, Jessica
ISBN No.: 9781138382220
Pages: 454
Year: 201809
Format: Trade Paper
Price: $ 98.03
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (On Demand)

The BYOD Revolution Adapted to Health Information Technology Meaningful Use The Possibility of hBYOD What is in it for the Organization So What can go Wrong? Mobile Device Management Consumerization of IT Business as Usual Making a Financial Case for BYOD Supporting BYOD Cost-Benefit Analysis Break-Even Analysis Estimating ROI for an IT Project Earned-Value Management Rapid Economic Justification Value Measuring Methodology Step 1: Develop a Decision Framework Task 1--Identify and Define the Value Structure Task 2--Identify and Define Risk Structure Task 3--Identify and Define the Cost Structure Task 4--Begin Documentation Step 2: Alternative Analysis--Estimate Value, Costs, and Risk Task 1--Identify and Define Alternatives Task 2--Estimate Value and Cost Task 3--Conduct Risk Analysis Task 4--Ongoing Documentation Step 3: Pull Together the Information Task 1--Aggregate the Cost Estimate Task 2--Calculate the ROI Task 3--Calculate the Value Score Task 4--Calculate the Risk Scores Task 5--Compare the Value, Cost, and Risk Step 4: Communicate and Document Task 1--Communicate the Value to Customers and Stakeholders Task 2--Prepare Budget Justification Documents Task 3--Satisfy Ad Hoc Reporting Requirements Task 4--Use Lessons Learned to Improve Processes Uncertainty Analysis Sensitivity Analysis Glossary Integrating hBYOD into Performance Measurement and Management Systems Measuring BYOD Why Measure? Understanding Performance Management Attributes of Successful Performance Measurement Systems Developing Benchmarks Using Balanced Scorecard to Measure BYOD Effectiveness Representative IT Balanced Scorecard Value Metrics Keeping Track of What is going on Validation and Verification Assessment and Mitigation of Risks in an hBYOD Environment What is a Risk Analysis? Initiating the Risk Assessment A Typical Organization''s Computer System System Architecture System Operational Authority/Ownership Threats to a Typical Organization''s Assets Current Security Measures COG Contingency Planning Divisional Contingency Planning Protection Against Network-Related Threats Vulnerabilities Reported by the Risk Assessment Team Recommendations for Mitigating the Identified Vulnerabilities Summary Guidelines for Managing and Securing Mobile Devices in the Health Organization HIPPA Security Rule Mobile Device Overview High-level Threats and Vulnerabilities Use of Untrusted Mobile Devices and Networks Use of Applications Created by Unknown Parties Interaction with Other Systems Use of Untrusted Content Use of Location Services Technologies for Mobile Device Management Components and Architectures Capabilities Security for the Life Cycle of Enterprise Mobile Device Solution Initiation Development Implementation Operations and Maintenance Disposal Cloud Best Practices Selecting a Cloud Service CSP and End-User Agreements TOS Agreements Nondisclosure Agreements Service-Level Agreements Terms and Definitions Measuring SLA Performance SLA Enforcement Mechanisms CSP, Organization, and Integrator Roles and Responsibilities Contracting with Integrators Clearly Defined Roles and Responsibilities Standards Security Continuous Monitoring Incident Response Key Escrow Forensics Audit Logs Privacy Impact Assessments Data Location Breach Response Configuration Management in a BYOD Environment CM and Process Improvement Measurement and Metrics Benefits of BYOD CM CM Components Configuration Identification Configuration Change Control Configuration Status Accounting Configuration Auditing Implementing CM in the Organization Manage the Risks of CM CM and Data Management Document Identification Data Status Level Management Data and Product Configuration Relationships Data Version Control Digital Data Transmittal Data Access Control Content Management for hBYOD Enterprise Information Management Content Management System DMS/Electronic DMS Records Management System Digital Asset Management Mobile Device Management and Mobile Content Management Integrating hBYOD into Resource Management Data Management Roles Data Management Responsibilities Guidelines Dictionary of Data Management Terms BYOD Means Social Networking Tools that Provide Networking Capabilities Wikis in Action Meaning-Based Computing Semantic Web Virtual Worlds KM Tools Mashups Getting a Quick Start on hBYOD Quick Start 1: Software-Based Authentication Procedures/Issues/Polices Quick Start 2: BYOD-- Making IT Work for Your Firm Procedures/Issues/Polices Quick Start 3: Software Selection from Multiple Packages Procedures/Issues/Polices Quick Start 4: The Make-Buy Decision Procedures/Issues/Polices Quick Start 5: IEEE Framework for Measures Procedures/Issues/Policies Quick Start 6: Common BYOD Mistakes Procedures/Issues/Polices Quick Start 7: BYOD Corporate Policy Procedures/Issues/Polices Quick Start 8: MDM Functionality Guide Procedures/Issues/Polices Quick Start 9: Legal Issues with BYOD Procedures/Issues/Polices The Fixes: How to Inoculate Your Company against Potential Legal Trouble Quick Start 10: Managing Online Content Checklist Procedures/Issues/Polices General Content Management Issues Quick Start 11: Selecting a Content Management System Checklist Procedures/Issues/Polices Before You Start Determining Project Goals and Targets Determining and Documenting Business Requirements Producing Documentation Evaluating and Selecting a Content Management System Quick Start 12: BYOD Lessons Learned Procedures/Issues/Polices Each Unique Survey . Survey . Survey Clarity Each and Every Platform should be IT''s BFF The App Store Problem Virtualization: Might It Be a Temporary Savior? Quick Start 13: BYOD Risks Procedures/Issues/Polices Quick Start 14: Getting Started with BYOD Procedures/Issues/Polices Quick Start 15: BYOD Security Tips Procedures/Issues/Polices Quick Start 16: Cloud Migration Tips Procedures/Issues/Polices Quick Start 17: Hitching Your Network to BYOD Procedures/Issues/Polices Appendices: Security Glossary Employee Mobile Device Agreement Mobile Device Security Checklist Security Configuration Recommendations for Apple iOS 5 Devices Traditional IT Metrics Reference Cloud Procurement Questions Computer Use Policy Benchmarking Data Collection Methods Wireless Device Agreement Mobile Device Management Vendors Best Practices Security Checklist Health Information Technology Glossary Security Rule Index.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...