Journal of healthcare protection management : publication of the International Association for Hospital Security最新文献

筛选
英文 中文
Should you outsource your hospital's security services? Some things to consider. 你应该将医院的安全服务外包吗?有些事情需要考虑。
David V DiNapoli
{"title":"Should you outsource your hospital's security services? Some things to consider.","authors":"David V DiNapoli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"46-54"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accident investigation for the security professional. 事故调查为安全专业人员。
William R Losefsky, Jeffrey M Putnam
{"title":"Accident investigation for the security professional.","authors":"William R Losefsky,&nbsp;Jeffrey M Putnam","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>One of the additional services that Security provides in the healthcare setting, should be accurate and thorough accident investigations. These can be critical in protecting your facility's interests, the authors point out. In this article, they describe in detail the accident investigation skills which are required of frontline security officers.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"61-6"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical security, HIPPA, and the HHS wall of shame. 人身安全,HIPPA,以及卫生与公众服务部的耻辱墙。
April Sage
{"title":"Physical security, HIPPA, and the HHS wall of shame.","authors":"April Sage","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2014 IHSSF crime survey. 2014年IHSSF犯罪调查。
Karim H Vellani
{"title":"The 2014 IHSSF crime survey.","authors":"Karim H Vellani","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"28-35"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tools for an effective annual review of the Security Management Plan. 对安全管理计划进行有效年度审查的工具。
Matthew Daniel
{"title":"Tools for an effective annual review of the Security Management Plan.","authors":"Matthew Daniel","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"105-8"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a metrics program that matters. 建立一个重要的度量程序。
George Campbell, Marleah Blades
{"title":"Building a metrics program that matters.","authors":"George Campbell,&nbsp;Marleah Blades","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Whether management wants it or not, as the security experts, it's our job to measure how we manage risk and inform management on our status, the authors say. In this article, they provide five steps to building a responsive security metrics program.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"116-24"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evidence collection and storage policies. 证据收集和存储策略。
Julie Schenck
{"title":"Evidence collection and storage policies.","authors":"Julie Schenck","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"88-91"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visiting nurse service and home healthcare visitation safety. 探访护士服务及家庭保健探访安全。
Dan Beaver
{"title":"Visiting nurse service and home healthcare visitation safety.","authors":"Dan Beaver","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"107-16"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TASERS in healthcare: myths and merits. 泰瑟在医疗保健:神话和优点。
Brian T Bastianelli
{"title":"TASERS in healthcare: myths and merits.","authors":"Brian T Bastianelli","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The author, who has trained thousands of police and civilians in use-of-force, tackles the controversy over the use of CEW technology (TASERS) in healthcare settings. In this article he provides the latest technical developments for such weapons, dispels three common myths about them, and provides fresh perspective for further discussion and consideration of their use in healthcare security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"30-4"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIPPA compliance for vendors and suppliers. 供应商和供应商遵守HIPPA。
John M White
{"title":"HIPPA compliance for vendors and suppliers.","authors":"John M White","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Between 30 to 45% of breaches in Protected Health Information (PHI) involve vendors, yet in most cases it is the hospital that is held liable for the breach. In this article, the author explores the practice of relying on vendors to conduct their own background checks of employees they assign to hospitals. He provides guidance on how hospitals can insure that such checks are up to the standards of the hospital's own background procedures without taking over that responsibility from vendors.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"91-7"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32241427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信