Cybersecurity in Healthcare: A National Study of HIPAA Implementation
Written by Dr. Mansur Hasib
Narrated by Digital Voice Mike G
()
About this audiobook
This audiobook is narrated by a digital voice.
Cited in the reference materials for the HealthCare Information Security and Privacy Practitioner (HCISPP) certification by ISC2 this is a national study of the state of cybersecurity in US healthcare. This work guides information governance in US healthcare and covers current scholarly literature on people leadership for the purposes of HIPAA compliance. The work also identifies significant deficiencies within NIST 800-66 for healthcare and provides solutions. The book contains ideas from the author's 30+ years of experience managing IT which includes 12 years in CIO roles in healthcare and biotechnology. The monograph is written for academics, students and business executives in plain business language with easy to understand charts and tables. All software tools used for the research were free and open source. Doctoral students and researchers should find the book helpful in providing guidance on the numerous methodological decisions an academic researcher has to make while conducting scholarly research.
The author is a globally recognized practitioner scholar and keynote speaker.
Written in plain language for academics, policy makers, and business professionals. Doctoral students will be able to benefit from the strong methodological approach used with every research decision explained and cited (for example when do we know that we have enough survey respondents?). Information security practitioners in any field will be able to use the work to fine tune their information technology governance strategy. Use the work to explain and justify your strategy to business executives in your organization. For a quick review, read Chapter One, Four and Five. Chapter Two is particularly helpful to anyone who needs to understand HIPAA, its associated rules and guidance and the current scholarly literature on the topic.
Related to Cybersecurity in Healthcare
Related audiobooks
A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsThe New Normal in IT: How the Global Pandemic Changed Information Technology Forever Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5Duty of Care: An Executive Guide for Corporate Boards in the Digital Era Rating: 4 out of 5 stars4/5HIPAA Compliance Officer - The Comprehensive Guide: Mastering Privacy and Security in Healthcare Management Rating: 0 out of 5 stars0 ratingsGDPR - Standard Data Protection Staff Training Rating: 5 out of 5 stars5/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Big Data: A Complete Guide to the Basic Concepts in Data Science, Cyber Security, Analytics and Metrics Rating: 4 out of 5 stars4/5OSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsData Analyses: Detailed, Scientific, and Business-Oriented Data Reading Skills Rating: 0 out of 5 stars0 ratingsWhy Privacy Matters Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsCustomer Data and Privacy: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsProfiling The Fraudster: Removing the Mask to Prevent and Detect Fraud (Wiley Corporate F&A) Rating: 0 out of 5 stars0 ratingsBig Data Analytics: Turning Big Data into Big Money Rating: 2 out of 5 stars2/5Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Rating: 0 out of 5 stars0 ratingsObfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5ISO/IEC 27701:2019: An introduction to privacy information management Rating: 5 out of 5 stars5/5CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/5CISSP: A Comprehensive Beginners Guide on the Information Systems Security Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratings
Law For You
Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5Sweet Taste of Liberty: A True Story of Slavery and Restitution in America Rating: 5 out of 5 stars5/5When Harry Became Sally: Responding to the Transgender Moment Rating: 4 out of 5 stars4/5The Color of Money: Black Banks and the Racial Wealth Gap Rating: 5 out of 5 stars5/5Covered with Night: A Story of Murder and Indigenous Justice in Early America Rating: 4 out of 5 stars4/5We Were Once a Family: A Story of Love, Death, and Child Removal in America Rating: 4 out of 5 stars4/5On Account of Race: The Supreme Court, White Supremacy, and the Ravaging of African American Voting Rights Rating: 4 out of 5 stars4/5The End of Policing Rating: 4 out of 5 stars4/5Six Women of Salem: The Untold Story of the Accused and Their Accusers in the Salem Witch Trials Rating: 4 out of 5 stars4/5The Sewing Girl's Tale: A Story of Crime and Consequences in Revolutionary America Rating: 4 out of 5 stars4/5Jews Don’t Count Rating: 4 out of 5 stars4/5Three Felonies A Day: How the Feds Target the Innocent Rating: 4 out of 5 stars4/5The Executive Juris Doctor: Learn to Think Like a Lawyer Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5By Hands Now Known: Jim Crow's Legal Executioners Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Law Says What?: Stuff You Didn't Know About the Law (but Really Should!) Rating: 4 out of 5 stars4/5Forensics: What Bugs, Burns, Prints, DNA, and More Tell Us about Crime Rating: 4 out of 5 stars4/5The Law of Law School: The Essential Guide for First-Year Law Students Rating: 5 out of 5 stars5/5The Law Rating: 4 out of 5 stars4/5Family Trusts: A Guide for Beneficiaries, Trustees, Trust Protectors, and Trust Creators Rating: 5 out of 5 stars5/5Norco '80: The True Story of the Most Spectacular Bank Robbery in American History Rating: 4 out of 5 stars4/5Chokehold: Policing Black Men Rating: 5 out of 5 stars5/5The Invention of Murder: How the Victorians Revelled in Death and Detection and Created Modern Crime Rating: 4 out of 5 stars4/5Estate & Trust Administration For Dummies Rating: 3 out of 5 stars3/5The Law of the Land: The Evolution of Our Legal System Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity in Healthcare
0 ratings0 reviews