Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations

Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations

Dawn-Marie Turner (DM Turner Informatics Consulting Inc., Canada) and Sunil Hazari (University of West Georgia, USA)
Copyright: © 2009 |Pages: 10
DOI: 10.4018/978-1-60566-366-1.ch017
OnDemand PDF Download:


Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about security and privacy of sensitive data that is prevalent in healthcare organizations. All healthcare organizations are governed by legislation and regulations, and the implementation of enterprise applications using new technology is comparatively more difficult than in other industries. Using a configuration-idiographic case-study approach, this study investigated challenges faced by two Canadian healthcare organizations. In addition to interviews with management and staff of the organizations, a walk-through was also conducted to observe and collect first-hand data of the implementation of wireless technology in the clinical environment. In the organizations under examination, it was found that wireless technology is being implemented gradually to augment the wired network. Problems associated with implementing wireless technology in these Canadian organizations are also discussed. Because of different standards in this technology, the two organizations are following different upgrade paths. Based on the data collected, best practices for secure wireless access in these organizations are proposed.
Chapter Preview


Technology, the Internet, and healthcare reform are converging to change the healthcare environment and create a seamless integrated healthcare network. This seamless network will facilitate the flow of information from multiple sources to multiple healthcare providers, administrators, patients, and other support services 24 hours a day, seven days a week, among multiple sites (Masys & Baker, 1997). Implementing and managing such a network within the healthcare environment poses unique challenges. First, medical and health information is highly sensitive; therefore security and privacy of the information must be a top priority. Security and privacy in healthcare is governed by legislation and regulation. In Manitoba, this means the Personal Health Information Act (PHIA). PHIA specifies how medical information can be accessed, by whom, and for what purposes. It also states the security and privacy regulations for all health information systems used within the province. Second, unlike other industries, medical care is not delivered in the same place even by the same healthcare professional, necessitating the need for multiple access points (APs) for the same information. For example, a physician on rounds moves from one patient to another, each of whom may reside in a different room, necessitating the need for network access in each room to record and receive data and communicate with other needed services such as pharmacy or nursing.

The challenge in creating a seamless network in healthcare is how to provide information to multiple users at the point in which they will require the information to deliver effective patient care. A wireless network may offer the opportunity to meet this challenge and provide significant benefits to the healthcare system. A wireless local area network (WLAN) offers improved accuracy and efficiency for documenting nursing care, decreased preventable medication error through better point-of-care medication-administration systems, an increase in patient satisfaction, and efficiency in admission and discharge and other health administration processes (Sims, 2004). Additional technical benefits include lower costs, less cabling, availability of the network in locations not accessible with a wired connection, and the ability to adapt to growth easier.

The implementation of a WLAN is not without its challenges. Some challenges such as performance, speed, and accessibility are similar to those of a wired network, but others such as limited battery power of the devices, necessitating the need for an electrical source if the device is required for extended use; higher risk of equipment loss; and interference with medical equipment are unique to the WLAN environment (Karygiannis & Owens, 2002). Multiple standards and the fact that a WLAN does not usually replace a wired network but augments it increases the complexity of the management and compatibility of new systems (Drew, 2003). However, security is the biggest challenge facing a healthcare organization contemplating a wireless network. Wireless networks pose an increased risk of eavesdropping, hackers, and rogue devices (Sims, 2004). Securing a WLAN and the perception of its security may be one of the most limiting factors in the widespread use of WLAN in healthcare today (Campbell & Durigon, 2003).

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Milena Head, Eldon Y. Li
Milena Head, Eldon Y. Li
Chapter 1
Jan H. Kietzmann
The recent evolution of mobile auto-identification technologies invites firms to connect to mobile work in altogether new ways. By strategically... Sample PDF
For Those About to Tag
Chapter 2
Adrian Lawrence, Jane Williams
As commercial interest in LBS increases, legal and regulatory bodies are becoming increasingly interested in the extent to which use of LBS may... Sample PDF
Privacy and Location-Based Mobile Services: Finding a Balance
Chapter 3
Dietmar G. Wiedemann, Wolfgang Palka, Key Pousttchi
A sizeable body of research on mobile payment evolved in recent years. Researchers analyzed success factors and acceptance criteria as well as... Sample PDF
Business Models for Mobile Payment Service Provision and Enabling
Chapter 4
Mikko Pynnonen, Jukka Hallikas, Petri Savolainen, Karri Mikkonen
In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those... Sample PDF
Ubiquitous Communication: where is the Value Created in the Multi-Play Value Network?
Chapter 5
Adam Vrechopoulos, Michail Batikas
Mobile government transform many of the traditional governance practices. The citizens’ adoption of M-Government services (e.g. voting, tax... Sample PDF
Predicting the Adoption of Mobile Government Services
Chapter 6
Katarzyna Wac, Richard Bults, Bert-Jan van Beijnum, Hong Chen, Dimitri Konstantas
Mobile service providers (MoSPs) emerge, driven by the ubiquitous availability of mobile devices and wireless communication infrastructures. MoSPs’... Sample PDF
Towards Mobile Web 2.0-Based Business Methods: Collaborative QoS-Information Sharing for Mobile Service Users
Chapter 7
Giangluigi Me, Daniele Pirro, Roberto Sarrecchia
Currently the most popular attacks to the E-Banking Web applications target the authentication systems relying on the single-side client... Sample PDF
Strong Authentication for Financial Services: PTDs as a Compromise Between Security and Usability
Chapter 8
Antonio Ruiz-Martinez, Daniel Sanchez-Martinez, Maria Martinez-Montesinos, Antonio Gomez-Skarmeta
Non-repudiation is an important issue in mobile business and mobile commerce in order to provide the necessary evidences to prove whether some party... Sample PDF
Mobile Signature Solutions for Guaranteeing Non-Repudiation in Mobile Business and Mobile Commerce
Chapter 9
Soe-Tsyr Yuan, Fang-Yu Chen
Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P... Sample PDF
UbiSrvInt: A Context-Aware Fault-Tolerance Approach for WP2P Service Provision
Chapter 10
Dianne Cyr, Milena Head, Alex Ivanov
Anytime anywhere services offered through mobile commerce hold great potential to serve customers in wireless environments. However, there is... Sample PDF
Perceptions of Mobile Device Website Design: Culture, Gender and Age Comparisons
Chapter 11
Douglass J. Scott, Constantinos K. Coursaris, Yuuki Kato, Shogo Kato
This study compared the exchange of emotional content in PC and mobile e-mail in business-related discussions. Forty American business people were... Sample PDF
The Exchange of Emotional Content in Business Communications: A Comparison of PC and Mobile E-Mail Users
Chapter 12
Carla Ruiz-Mafe, Silvia Sanz-Blas, Adrian Broz-Lofiego, Daniel Marchuet
The chapter aims to present an in-depth study of the factors influencing Mobile Internet adoption. The authors analyse the influence of Internet use... Sample PDF
Mobile Internet Adoption by Spanish Consumers
Chapter 13
Mahil Carr
This chapter introduces concepts, frameworks and possible models for introducing mobile payments in India. The introductory section defines mobile... Sample PDF
Framework for Mobile Payment Systems in India
Chapter 14
E.S. Samundeeswari, F. Mary Magdalene Jane
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server... Sample PDF
Mobile Code and Security Issues
Chapter 15
Tommi Pelkonen
This chapter describes the Finnish mobile telecommunications industry trends and prospects. In addition, it presents two theoretical frameworks... Sample PDF
Finland: Internationalization as the key to Growth and M-Commerce Success
Chapter 16
Dickson K.W. Chiu, S.C. Cheun, Ho-Fung Leung
In a service-oriented enterprise, the professional workforce such as salespersons and support staff tends to be mobile with the recent advances in... Sample PDF
Mobile Workforce Management in a Service-Oriented Enterprise: Capturing Concepts and Requirements in a Multi-Agent Infrastructure
Chapter 17
Dawn-Marie Turner, Sunil Hazari
Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about... Sample PDF
Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations
About the Contributors