tion of effective, secure distributed systems are still not well understood by many users or designers, nor are methods for the detection and control of intrusions. Management ignorance and uncertainties translate into delays in defining requirements for, procuring, and deploying modern health care information systems. Distributed system technologies, including security, need to be demystified, and managers must be educated about realistic goals, alternative solutions, and operational practices to take advantage of these tools. Only in this way can the health care industry improve its practices for protecting electronic health information.
The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
4 Technical Approaches to Protecting Electronic Health Information ."
For the Record: Protecting Electronic Health Information . Washington, DC: The National Academies Press,
Please select a format: