Medicine, Dentistry & Health Sciences Collected Works - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 3 of 3
  • Item
    No Preview Available
    Status of bring-your-own-device (BYOD) security practices in Australian hospitals-A national survey
    Wani, TA ; Mendoza, A ; Gray, K ; Smolenaers, F (ELSEVIER SCI LTD, 2022-09)
  • Item
    Thumbnail Image
    Bring-Your-Own-Device Usage Trends in Australian Hospitals - A National Survey
    Wani, TA ; Mendoza, A ; Gray, K ; Merolli, M ; Bain, C ; Schaper, LK (IOS PRESS, 2021)
    Background: Healthcare is among the leading industries which drives the use of personal devices for work purposes (BYOD). However, allowing BYOD for healthcare workers comes at a cost, as it puts sensitive information assets such as patient data residing on personal devices at risk of potential data breaches. Objective: Previous review of the literature has highlighted the dearth of empirical studies in hospital settings regarding BYOD usage. As such, this paper aims to report BYOD usage trends in Australian hospitals through a national survey, first of its kind in Australia. Methods: An anonymous survey was conducted online among health IT personnel, asking them about their experiences about BYOD usage in their hospitals. 28 responses were collected based on public Australian hospitals, which included 21 hospital groups and 7 standalone hospitals, likely to represent more than 100 hospitals in total. Survey responses were quantitatively analysed through descriptive statistical analysis and cross tabulation. Results: BYOD is allowed in majority of the hospitals, and among all major staff groups, with doctors being the leading group. Participants ranked reasons for allowing BYOD, and most of them were related to improvement in clinical productivity, efficiency and mobility for clinical staff. Challenges were generally related to data security such as patient data breaches and compliance with data security laws, according to them. More than two thirds of hospitals had a cybersecurity officer employed, and CIOs were the most dominant group who held responsibility for managing BYOD within the hospital. Conclusion: This paper provides a starting point for better understanding of BYOD usage in a complex healthcare environment based on empirical evidence, one which highlights the security-usability conundrum, confirming previous literature themes.
  • Item
    Thumbnail Image
    Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature
    Wani, TA ; Mendoza, A ; Gray, K (JMIR PUBLICATIONS, INC, 2020-06-18)
    BACKGROUND: As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations. OBJECTIVE: Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. METHODS: A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman's People Policy Technology model, promoting a holistic understanding of hospitals' BYOD security issues and solutions. RESULTS: A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data. CONCLUSIONS: The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.