ganizations. 3 While the use of mobile devices in the workplace
can increase productivity in simple, manageable ways, there
are several potential risks when mobile devices are used to create, receive, maintain, or transmit electronic personal health
information (ePHI). 4
Results and Discussion
The public is not very informed about the need for additional
security levels beyond password and biometrics on the home
screen, according to results of the DSU survey. Individuals
are not sufficiently protecting their PHI from outside intruders since they are not aware of the need for additional security, which can include antivirus software and exclusive use
of secure Wi-Fi networks. The survey also indicated that 56.4
percent of participants did not use antivirus programs on their
smartphones but used other methods of security.
Of the 39 returned surveys (not a full representation of the
population surveyed), 97 percent of the responses—in a reflection of AHIMA’s demographics—were from female participants. Other findings are outlined on Table 1.
In response to the question “What type of antivirus software
do you have on your phone, if any?” more than half of those
surveyed indicated that they do not have antivirus software on
their smartphone, leaving them vulnerable for hacking.
Room for Additional Education
As indicated in this study, healthcare administrative profes-
sionals are aware of the need to protect the data on their smart-
phones with some level of security. However, there is room for
additional education on the best ways to protect personal and
confidential information on smartphones from hackers.
Potential next steps include conducting additional research
that includes a systematic review or meta-analysis of all related
published literature. ¢
1. Perez, Sarah. “U.S. consumers now spend 5 hours per day
on mobile devices.” Tech Crunch. March 3, 2017. https://
2. Becker’s Health IT & CIO Report. “Report: 80% of Physicians Use Smartphones, Medical Aps.” https://www.
3. US Department of Health and Human Services. “Summary
of the HIPAA Privacy Rule.” https://www.hhs.gov/hipaa/
4. National Institute of Standards and Technology. “
Guidelines for Managing the Security of Mobile Devices in the
Enterprise.” June 2013. https://nvlpubs.nist.gov/nistpubs/
Julie Wulf Plimpton ( Julie.email@example.com) is an assistant professor at Dakota State University.
Graph 1 – PHR Use on Smartphones
THIS QUESTION ASKED respondents about how they accessed their health data on their phones.
0% 20% 40% 60% 80% 100%
26.8% Mobile application
I don’t use my phone to access my PHR