University Library
  • Login
A gateway to Melbourne's research publications
Minerva Access is the University's Institutional Repository. It aims to collect, preserve, and showcase the intellectual output of staff and students of the University of Melbourne for a global audience.
View Item 
  • Minerva Access
  • Medicine, Dentistry & Health Sciences
  • Medicine, Dentistry & Health Sciences Collected Works
  • Medicine, Dentistry & Health Sciences Collected Works - Research Publications
  • View Item
  • Minerva Access
  • Medicine, Dentistry & Health Sciences
  • Medicine, Dentistry & Health Sciences Collected Works
  • Medicine, Dentistry & Health Sciences Collected Works - Research Publications
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

    Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature

    Thumbnail
    Download
    Published version (178.8Kb)

    Citations
    Scopus
    Altmetric
    1
    Author
    Wani, TA; Mendoza, A; Gray, K
    Date
    2020-06-18
    Source Title
    JMIR mHealth and uHealth
    Publisher
    JMIR PUBLICATIONS, INC
    University of Melbourne Author/s
    Mendoza, Antonette; Gray, Kathleen
    Affiliation
    Medicine Dentistry & Health Sciences
    Computing and Information Systems
    Metadata
    Show full item record
    Document Type
    Journal Article
    Citations
    Wani, T. A., Mendoza, A. & Gray, K. (2020). Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR MHEALTH AND UHEALTH, 8 (6), https://doi.org/10.2196/18175.
    Access Status
    Open Access
    URI
    http://hdl.handle.net/11343/252383
    DOI
    10.2196/18175
    Abstract
    BACKGROUND: As familiarity with and convenience of using personal devices in hospitals help improve the productivity, efficiency, and workflow of hospital staff, the health care bring-your-own-device (BYOD) market is growing consistently. However, security concerns owing to the lack of control over the personal mobile devices of staff, which may contain sensitive data such as personal health information of patients, make it one of the biggest health care information technology (IT) challenges for hospital administrations. OBJECTIVE: Given that the hospital BYOD security has not been adequately addressed in peer-reviewed literature, the aim of this paper was to identify key security challenges associated with hospital BYOD usage as well as relevant solutions that can cater to the identified issues by reviewing gray literature. Therefore, this research will provide additional practical insights from current BYOD practices. METHODS: A comprehensive gray literature review was conducted, which followed the stepwise guidelines and quality assessment criteria set out by Garousi et al. The searched literature included tier 1 sources such as health care cybersecurity market reports, white papers, guidelines, policies, and frameworks as well as tier 2 sources such as credible and reputed health IT magazines, databases, and news articles. Moreover, a deductive thematic analysis was conducted to organize the findings based on Schlarman's People Policy Technology model, promoting a holistic understanding of hospitals' BYOD security issues and solutions. RESULTS: A total of 51 sources were found to match the designed eligibility criteria. From these studies, several sociotechnical issues were identified. The major challenges identified were the use of devices with insufficient security controls by hospital staff, lack of control or visibility for the management to maintain security requirements, lack of awareness among hospital staff, lack of direction or guidance for BYOD usage, poor user experience, maintenance of legal requirements, shortage of cybersecurity skills, and loss of devices. Although technologies such as mobile device management, unified endpoint management, containerization, and virtual private network allow better BYOD security management in hospitals, policies and people management measures such as strong security culture and staff awareness and training improve staff commitment in protecting hospital data. CONCLUSIONS: The findings suggest that to optimize BYOD security management in hospitals, all 3 dimensions of the security process (people, policy, and technology) need to be given equal emphasis. As the nature of cybersecurity attacks is becoming more complex, all dimensions should work in close alignment with each other. This means that with the modernization of BYOD technology, BYOD strategy, governance, education, and relevant policies and procedures also need to adapt accordingly.

    Export Reference in RIS Format     

    Endnote

    • Click on "Export Reference in RIS Format" and choose "open with... Endnote".

    Refworks

    • Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References


    Collections
    • Minerva Elements Records [45689]
    • Computing and Information Systems - Research Publications [1454]
    • Medicine, Dentistry & Health Sciences Collected Works - Research Publications [578]
    Minerva AccessDepositing Your Work (for University of Melbourne Staff and Students)NewsFAQs

    BrowseCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects
    My AccountLoginRegister
    StatisticsMost Popular ItemsStatistics by CountryMost Popular Authors