33 hours ago This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical … >> Go To The Portal
A full understanding of the KP Online breach requires technical, individual, group, organizational, and cross-level analysis. Technical Level: The Architecture and Management of the Kaiser IT Infrastructure Two individuals made specific mistakes that led to the immediate breach of message security.
1 Complex, tightly-coupled computerized health information system architectures potentially aggravate security breaches or other mistakes with their capacity to transform errors into cascading system accidents.
A full understanding of the KP Online breach requires technical, individual, group, organizational, and cross-level analysis. Technical Level: The Architecture and Management of the Kaiser IT Infrastructure
This case study offers cautionary lessons for health care administrators as well as areas for further research. 1 Complex, tightly-coupled computerized health information system architectures potentially aggravate security breaches or other mistakes with their capacity to transform errors into cascading system accidents.
This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal.
Serving over eight million members in nine states and the District of Columbia, Kaiser Permanente (KP) functions as an integrated health delivery system. In 1995 the KP Northern California region funded an innovation project to create an Internet Patient Portal known as “Kaiser Permanente Online” (KP Online).
This case study follows the long tradition of ethnographic research that focuses on extended “trouble cases.” 1–8 Trouble cases have the virtue of exposing the taken-for-granted principles of everyday life normally obscured by the apparently unproblematic patterns that drive routine living.
A full understanding of the KP Online breach requires technical, individual, group, organizational, and cross-level analysis.
This case study offers cautionary lessons for health care administrators as well as areas for further research.