Cybersecurity in Healthcare: A National Study of HIPAA Implementation
Written by Dr. Mansur Hasib
Narrated by Digital Voice Mike G
()
About this audiobook
This audiobook is narrated by a digital voice.
Cited in the reference materials for the HealthCare Information Security and Privacy Practitioner (HCISPP) certification by ISC2 this is a national study of the state of cybersecurity in US healthcare. This work guides information governance in US healthcare and covers current scholarly literature on people leadership for the purposes of HIPAA compliance. The work also identifies significant deficiencies within NIST 800-66 for healthcare and provides solutions. The book contains ideas from the author's 30+ years of experience managing IT which includes 12 years in CIO roles in healthcare and biotechnology. The monograph is written for academics, students and business executives in plain business language with easy to understand charts and tables. All software tools used for the research were free and open source. Doctoral students and researchers should find the book helpful in providing guidance on the numerous methodological decisions an academic researcher has to make while conducting scholarly research.
The author is a globally recognized practitioner scholar and keynote speaker.
Written in plain language for academics, policy makers, and business professionals. Doctoral students will be able to benefit from the strong methodological approach used with every research decision explained and cited (for example when do we know that we have enough survey respondents?). Information security practitioners in any field will be able to use the work to fine tune their information technology governance strategy. Use the work to explain and justify your strategy to business executives in your organization. For a quick review, read Chapter One, Four and Five. Chapter Two is particularly helpful to anyone who needs to understand HIPAA, its associated rules and guidance and the current scholarly literature on the topic.
Related to Cybersecurity in Healthcare
Related audiobooks
A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsDuty of Care: An Executive Guide for Corporate Boards in the Digital Era Rating: 4 out of 5 stars4/5The New Normal in IT: How the Global Pandemic Changed Information Technology Forever Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsBusiness Continuity Management: Building an Effective Incident Management Plan Rating: 5 out of 5 stars5/5Exposing Pay: Pay Transparency and What It Means for Employees, Employers, and Public Policy Rating: 0 out of 5 stars0 ratingsProfiling The Fraudster: Removing the Mask to Prevent and Detect Fraud (Wiley Corporate F&A) Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsGDPR - Standard Data Protection Staff Training Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Quantum Care: A Deep Dive into AI for Health Delivery and Research Rating: 0 out of 5 stars0 ratingsBig Data: A Complete Guide to the Basic Concepts in Data Science, Cyber Security, Analytics and Metrics Rating: 4 out of 5 stars4/5Customer Data and Privacy: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Social Media at Work: How Networking Tools Propel Organizational Performance Rating: 2 out of 5 stars2/5CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/5CISSP: A Comprehensive Beginners Guide on the Information Systems Security Rating: 0 out of 5 stars0 ratingsThe Decade Of Do: A new era for marketing and communications Rating: 0 out of 5 stars0 ratingsEU GDPR – An international guide to compliance Rating: 5 out of 5 stars5/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratingsISO/IEC 27701:2019: An introduction to privacy information management Rating: 5 out of 5 stars5/5Strategy in the Digital Age: Mastering Digital Transformation Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsSummary of John P. Kotter & Holger Rathgeber's That's Not How We Do it Here! Rating: 0 out of 5 stars0 ratings
Law For You
The End of Policing Rating: 4 out of 5 stars4/5The Color of Money: Black Banks and the Racial Wealth Gap Rating: 5 out of 5 stars5/5Sweet Taste of Liberty: A True Story of Slavery and Restitution in America Rating: 5 out of 5 stars5/5We Were Once a Family: A Story of Love, Death, and Child Removal in America Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5When Harry Became Sally: Responding to the Transgender Moment Rating: 4 out of 5 stars4/5On Account of Race: The Supreme Court, White Supremacy, and the Ravaging of African American Voting Rights Rating: 4 out of 5 stars4/5Covered with Night: A Story of Murder and Indigenous Justice in Early America Rating: 4 out of 5 stars4/5The Law of Law School: The Essential Guide for First-Year Law Students Rating: 5 out of 5 stars5/5Arrest-Proof Yourself: Second Edition Rating: 4 out of 5 stars4/5The Executive Juris Doctor: Learn to Think Like a Lawyer Rating: 4 out of 5 stars4/5Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5The Invention of Murder: How the Victorians Revelled in Death and Detection and Created Modern Crime Rating: 4 out of 5 stars4/5Forensics: What Bugs, Burns, Prints, DNA, and More Tell Us about Crime Rating: 4 out of 5 stars4/5Hitler's American Model: The United States and the Making of Nazi Race Law Rating: 4 out of 5 stars4/5Six Women of Salem: The Untold Story of the Accused and Their Accusers in the Salem Witch Trials Rating: 4 out of 5 stars4/5Jews Don’t Count Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Limited Liability Companies For Dummies: 3rd Edition Rating: 4 out of 5 stars4/5Buy It, Rent It, Profit!: Make Money as a Landlord in ANY Real Estate Market Rating: 5 out of 5 stars5/5All You Need to Know About the Music Business: 11th Edition Rating: 0 out of 5 stars0 ratingsFamily Trusts: A Guide for Beneficiaries, Trustees, Trust Protectors, and Trust Creators Rating: 5 out of 5 stars5/5By Hands Now Known: Jim Crow's Legal Executioners Rating: 5 out of 5 stars5/5The Law Says What?: Stuff You Didn't Know About the Law (but Really Should!) Rating: 4 out of 5 stars4/5The Law Rating: 4 out of 5 stars4/5The Sewing Girl's Tale: A Story of Crime and Consequences in Revolutionary America Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity in Healthcare
0 ratings0 reviews