Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives

Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives

Alberto Carneiro
Copyright: © 2016 |Volume: 4 |Issue: 2 |Pages: 18
ISSN: 2155-5621|EISSN: 2155-563X|EISBN13: 9781466692954|DOI: 10.4018/IJPHIM.2016070101
Cite Article Cite Article

MLA

Carneiro, Alberto. "Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives." IJPHIM vol.4, no.2 2016: pp.1-18. http://doi.org/10.4018/IJPHIM.2016070101

APA

Carneiro, A. (2016). Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives. International Journal of Privacy and Health Information Management (IJPHIM), 4(2), 1-18. http://doi.org/10.4018/IJPHIM.2016070101

Chicago

Carneiro, Alberto. "Maturity in Health Organization Information Systems: Metrics and Privacy Perspectives," International Journal of Privacy and Health Information Management (IJPHIM) 4, no.2: 1-18. http://doi.org/10.4018/IJPHIM.2016070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Adapting maturity models to healthcare organization's needs is an issue that researchers and technicians should consider and a valuable instrument for IT managers because these models allow the assessment of a present situation as well as the identification of useful improvement measures. This paper discusses the practical utilization of maturity models, including different manners of exploring model's usefulness. For a more complete understanding of maturity models, the selection of criteria and processes of measurement, called metrics, is briefly reviewed in terms of indicators and daily procedures. Some issues of management information systems security are briefly addressed, along with a note on measuring security assessment. Finally some considerations are presented about the need for privacy of personal data to ensure the strategies to be pursued to sensitive data in order to establish a level of effective privacy which is included in the concerns of security of information systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.