Security Considerations for E-Mental Health Interventions
Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service...
Kaydedildi:
Asıl Yazarlar: | , , |
---|---|
Materyal Türü: | Kitap |
Baskı/Yayın Bilgisi: |
JMIR Publications,
2010-12-01T00:00:00Z.
|
Konular: | |
Online Erişim: | Connect to this object online. |
Etiketler: |
Etiketle
Etiket eklenmemiş, İlk siz ekleyin!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | doaj_2c27aaf75e1449ef9b98b67c8a8a0fd2 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Bennett, Kylie |e author |
700 | 1 | 0 | |a Bennett, Anthony James |e author |
700 | 1 | 0 | |a Griffiths, Kathleen Margaret |e author |
245 | 0 | 0 | |a Security Considerations for E-Mental Health Interventions |
260 | |b JMIR Publications, |c 2010-12-01T00:00:00Z. | ||
500 | |a 1438-8871 | ||
500 | |a 10.2196/jmir.1468 | ||
520 | |a Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. | ||
546 | |a EN | ||
690 | |a Computer applications to medicine. Medical informatics | ||
690 | |a R858-859.7 | ||
690 | |a Public aspects of medicine | ||
690 | |a RA1-1270 | ||
655 | 7 | |a article |2 local | |
786 | 0 | |n Journal of Medical Internet Research, Vol 12, Iss 5, p e61 (2010) | |
787 | 0 | |n http://www.jmir.org/2010/5/e61/ | |
787 | 0 | |n https://doaj.org/toc/1438-8871 | |
856 | 4 | 1 | |u https://doaj.org/article/2c27aaf75e1449ef9b98b67c8a8a0fd2 |z Connect to this object online. |