2011 Health Care IT Survey - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next 2011 Health Care IT Survey-7 Next

The majority of respondents have currently deployed personal devices for physicians, or have plans to deploy in 2011 or 2012.

With 2011 upon us, the race is on for hospitals nationwide to deploy electronic medical records (EMRs), meet meaningful use criteria and earn a coveted part of the stimulus fund the government set aside for implementing health information technology. Taking the necessary steps to meet meaningful use criteria is a top priority for healthcare organizations. One of the biggest challenges in achieving meaningful use is physician adoption of EMRs. With 48 percent of healthcare executives believing password management issues slow physician adoption of EMR, it is clear that ensuring quick and easy access to patient data is a must.

Imprivata’s North American health care survey, highlighted in this slideshow, is focused on identifying technology trends relating to the meaningful use of EMRs, secure access to protected health information (PHI), and the impact of new technology on clinician workflow and improved patient outcomes. The online survey was conducted via SurveyMonkey, an online survey services provider, and polled nearly 500 health care IT decision makers and executives.

More Slideshows:

2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

Top Outsourcing Trends for Q4 2010 The latest outsourcing trends identified by the Everest Group.

Seven Critical Questions to Ask Before Developing a Social Media Policy Increase project success rates by providing well-defined guidance for social media initiatives.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.