首页 > 最新文献

Journal of healthcare protection management : publication of the International Association for Hospital Security最新文献

英文 中文
Should you outsource your hospital's security services? Some things to consider. 你应该将医院的安全服务外包吗?有些事情需要考虑。
David V DiNapoli

The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.

提交人既管理过内部保安服务,也管理过合同保安服务,他明确指出,医院可以通过雇用保安公司来节省资金,但他警告说,可能会涉及其他考虑。在本文中,他提供了如何在这两个选项之间进行有效和有意义的比较的指导。
{"title":"Should you outsource your hospital's security services? Some things to consider.","authors":"David V DiNapoli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"46-54"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accident investigation for the security professional. 事故调查为安全专业人员。
William R Losefsky, Jeffrey M Putnam

One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.

安全部门在医疗保健环境中提供的额外服务之一应该是准确而彻底的事故调查。作者指出,这些对保护你的机构的利益至关重要。在这篇文章中,他们详细描述了前线保安员所需要的事故调查技巧。
{"title":"Accident investigation for the security professional.","authors":"William R Losefsky,&nbsp;Jeffrey M Putnam","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"61-6"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical security, HIPPA, and the HHS wall of shame. 人身安全,HIPPA,以及卫生与公众服务部的耻辱墙。
April Sage

In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.

在本文中,作为医疗保健IT专家的作者揭示了专家在分析HIPPA数据泄露时所发现的内容。大多数是由于被盗或丢失造成的。她解释了为什么会这样,并提供了一个解决方案——提高物理安全性。
{"title":"Physical security, HIPPA, and the HHS wall of shame.","authors":"April Sage","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2014 IHSSF crime survey. 2014年IHSSF犯罪调查。
Karim H Vellani
{"title":"The 2014 IHSSF crime survey.","authors":"Karim H Vellani","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"28-35"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tools for an effective annual review of the Security Management Plan. 对安全管理计划进行有效年度审查的工具。
Matthew Daniel

A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

根据联合委员会的要求,医院的安全管理计划也可以被安全管理专业人员使用,作者指出,以确保他们在不断变化的医疗环境中不断监测和改进该计划。
{"title":"Tools for an effective annual review of the Security Management Plan.","authors":"Matthew Daniel","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"105-8"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a metrics program that matters. 建立一个重要的度量程序。
George Campbell, Marleah Blades

Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.

作者说,无论管理层是否愿意,作为安全专家,我们的工作是衡量我们如何管理风险,并向管理层通报我们的状态。在本文中,他们提供了构建响应性安全度量程序的五个步骤。
{"title":"Building a metrics program that matters.","authors":"George Campbell,&nbsp;Marleah Blades","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"116-24"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evidence collection and storage policies. 证据收集和存储策略。
Julie Schenck
{"title":"Evidence collection and storage policies.","authors":"Julie Schenck","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"88-91"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visiting nurse service and home healthcare visitation safety. 探访护士服务及家庭保健探访安全。
Dan Beaver
{"title":"Visiting nurse service and home healthcare visitation safety.","authors":"Dan Beaver","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"107-16"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TASERS in healthcare: myths and merits. 泰瑟在医疗保健:神话和优点。
Brian T Bastianelli

The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.

作者对数千名警察和平民进行了使用武力的培训,他处理了在医疗保健环境中使用CEW技术(TASERS)的争议。在本文中,他提供了此类武器的最新技术发展,消除了关于它们的三个常见神话,并为进一步讨论和考虑它们在医疗安全中的使用提供了新的视角。
{"title":"TASERS in healthcare: myths and merits.","authors":"Brian T Bastianelli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"30-4"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIPPA compliance for vendors and suppliers. 供应商和供应商遵守HIPPA。
John M White

Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.

30%至45%的受保护健康信息(PHI)违规涉及供应商,但在大多数情况下,医院应对违规行为承担责任。在这篇文章中,作者探讨了依靠供应商对他们分配到医院的员工进行自己的背景调查的做法。他就医院如何在不从供应商那里接管责任的情况下,确保这些检查符合医院自己的后台程序标准提供了指导。
{"title":"HIPPA compliance for vendors and suppliers.","authors":"John M White","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"91-7"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of healthcare protection management : publication of the International Association for Hospital Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1