Book description
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it’s a question of will you be ready.
BYOD for Healthcare provides authoritative guidance to help you thrive during the healthcare BYOD (hBYOD) revolution. Jessica Keyes, president of New Art Technologies, Inc., professor at the University of Liverpool, and former managing director of R&D for the New York Stock Exchange, supplies an understanding of these new end users, their demands, and the strategic and tactical ramifications of these demands.
Maintaining a focus on the healthcare industry, the book considers the broad range of technical considerations, including selection, connectivity, training, support, and security. It examines the integration of BYOD to current health IT, legal, regulatory, and ethical issues. It also covers risk assessment and mitigation strategies for an hBYOD environment that are in line with medical laws, regulations, ethics, and the HIPAA and HITECH Acts.
The text discusses BYOD security and provides time-saving guidance on how to configure your hBYOD environment. It also considers how BYOD impacts resource management, certification of EMR/EHR software, health informatics, and health information exchange.
The book covers content and data management, risk assessment, and performance measurement and management. It includes a set of Quick Start guides with tips for assessing costs, cloud integration, and legal issues. It also contains a robust appendix with information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- Author
- Chapter 1: The BYOD Revolution Adapted to Health Information Technology (1/3)
- Chapter 1: The BYOD Revolution Adapted to Health Information Technology (2/3)
- Chapter 1: The BYOD Revolution Adapted to Health Information Technology (3/3)
- Chapter 2: Making a Financial Case for BYOD (1/8)
- Chapter 2: Making a Financial Case for BYOD (2/8)
- Chapter 2: Making a Financial Case for BYOD (3/8)
- Chapter 2: Making a Financial Case for BYOD (4/8)
- Chapter 2: Making a Financial Case for BYOD (5/8)
- Chapter 2: Making a Financial Case for BYOD (6/8)
- Chapter 2: Making a Financial Case for BYOD (7/8)
- Chapter 2: Making a Financial Case for BYOD (8/8)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (1/6)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (2/6)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (3/6)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (4/6)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (5/6)
- Chapter 3: Integrating hBYOD into Performance Measurement and Management Systems (6/6)
- Chapter 4: Assessment and Mitigation of Risks in an hBYOD Environment (1/4)
- Chapter 4: Assessment and Mitigation of Risks in an hBYOD Environment (2/4)
- Chapter 4: Assessment and Mitigation of Risks in an hBYOD Environment (3/4)
- Chapter 4: Assessment and Mitigation of Risks in an hBYOD Environment (4/4)
- Chapter 5: Guidelines for Managing and Securing Mobile Devices in the Health Organization (1/5)
- Chapter 5: Guidelines for Managing and Securing Mobile Devices in the Health Organization (2/5)
- Chapter 5: Guidelines for Managing and Securing Mobile Devices in the Health Organization (3/5)
- Chapter 5: Guidelines for Managing and Securing Mobile Devices in the Health Organization (4/5)
- Chapter 5: Guidelines for Managing and Securing Mobile Devices in the Health Organization (5/5)
- Chapter 6: Cloud Computing Best Practices (1/3)
- Chapter 6: Cloud Computing Best Practices (2/3)
- Chapter 6: Cloud Computing Best Practices (3/3)
- Chapter 7: Configuration Management in a BYOD Environment (1/5)
- Chapter 7: Configuration Management in a BYOD Environment (2/5)
- Chapter 7: Configuration Management in a BYOD Environment (3/5)
- Chapter 7: Configuration Management in a BYOD Environment (4/5)
- Chapter 7: Configuration Management in a BYOD Environment (5/5)
- Chapter 8: Content Management for hBYOD (1/3)
- Chapter 8: Content Management for hBYOD (2/3)
- Chapter 8: Content Management for hBYOD (3/3)
- Chapter 9: Integrating hBYOD into Resource Management (1/6)
- Chapter 9: Integrating hBYOD into Resource Management (2/6)
- Chapter 9: Integrating hBYOD into Resource Management (3/6)
- Chapter 9: Integrating hBYOD into Resource Management (4/6)
- Chapter 9: Integrating hBYOD into Resource Management (5/6)
- Chapter 9: Integrating hBYOD into Resource Management (6/6)
- Chapter 10: BYOD Means Social Networking (1/5)
- Chapter 10: BYOD Means Social Networking (2/5)
- Chapter 10: BYOD Means Social Networking (3/5)
- Chapter 10: BYOD Means Social Networking (4/5)
- Chapter 10: BYOD Means Social Networking (5/5)
- Chapter 11: Getting a Quick Start on hBYOD (1/5)
- Chapter 11: Getting a Quick Start on hBYOD (2/5)
- Chapter 11: Getting a Quick Start on hBYOD (3/5)
- Chapter 11: Getting a Quick Start on hBYOD (4/5)
- Chapter 11: Getting a Quick Start on hBYOD (5/5)
- Appendix 1 (1/2)
- Appendix 1 (2/2)
- Appendix 2
- Appendix 3
- Appendix 4 (1/9)
- Appendix 4 (2/9)
- Appendix 4 (3/9)
- Appendix 4 (4/9)
- Appendix 4 (5/9)
- Appendix 4 (6/9)
- Appendix 4 (7/9)
- Appendix 4 (8/9)
- Appendix 4 (9/9)
- Appendix 5 (1/4)
- Appendix 5 (2/4)
- Appendix 5 (3/4)
- Appendix 5 (4/4)
- Appendix 6 (1/2)
- Appendix 6 (2/2)
- Appendix 7
- Appendix 8 (1/2)
- Appendix 8 (2/2)
- Appendix 9
- Appendix 10
- Appendix 11 (1/11)
- Appendix 11 (2/11)
- Appendix 11 (3/11)
- Appendix 11 (4/11)
- Appendix 11 (5/11)
- Appendix 11 (6/11)
- Appendix 11 (7/11)
- Appendix 11 (8/11)
- Appendix 11 (9/11)
- Appendix 11 (10/11)
- Appendix 11 (11/11)
- Appendix 12 (1/4)
- Appendix 12 (2/4)
- Appendix 12 (3/4)
- Appendix 12 (4/4)
- Appendix 13 (1/2)
- Appendix 13 (2/2)
- Back Cover
Product information
- Title: BYOD for Healthcare
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781482219821
You might also like
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Bring Your Own Device - The mobile computing challenge
The increasing use of personal devices such as smartphones and tablets in the workplace at work …
book
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …