2011
DOI: 10.1037/a0026102
|View full text |Cite
|
Sign up to set email alerts
|

Security management in telepsychology.

Abstract: Psychologists increasingly rely upon “telepsychology” (e.g., e-mail and Internet-based client communications) despite the growing presence of threats to online security. However, practitioners may overestimate the benefits of electronic communications and underestimate their risks. Using the example of the availability heuristic as one cognitive bias, which may promote this imbalance, this article reviews a number of resources for practitioners that provide enhanced security and confidentiality in the digital … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Accordingly, we must be cautious against conducting VTC-based treatment in the absence of guidance from the broader professional community, particularly given the unique security, privacy, and liability concerns associated with such care. Fortunately, a guiding dialogue has begun to unfold about the management of threats to confidentiality—addressing key issues such as encryption and privacy protection (American Telemedicine Association, 2009; Banitt Duncan et al, in press; Kramer, Mishkind, Luxton, & Shore, 2013; Schwartz & Lonborg, 2011; Yuen, Goetter, Herbert, & Forman, 2012). However, there is still much to be clarified, and in the interim participating families must be clearly informed prior to consenting to VTC services that there is no current consensus on the role of VTC in mental health care.…”
Section: Discussionmentioning
confidence: 99%
“…Accordingly, we must be cautious against conducting VTC-based treatment in the absence of guidance from the broader professional community, particularly given the unique security, privacy, and liability concerns associated with such care. Fortunately, a guiding dialogue has begun to unfold about the management of threats to confidentiality—addressing key issues such as encryption and privacy protection (American Telemedicine Association, 2009; Banitt Duncan et al, in press; Kramer, Mishkind, Luxton, & Shore, 2013; Schwartz & Lonborg, 2011; Yuen, Goetter, Herbert, & Forman, 2012). However, there is still much to be clarified, and in the interim participating families must be clearly informed prior to consenting to VTC services that there is no current consensus on the role of VTC in mental health care.…”
Section: Discussionmentioning
confidence: 99%
“…We must be extremely cautious against allowing technology-assisted practices operating in the absence of guidance from the broader professional community, particularly given the unique privacy, security, and liability concerns inherent in such care. In recent years, a guiding dialogue has begun to unfold on the management of threats to confidentiality (Schwartz & Lonborg, 2011; Yuen, Goetter, Herbert, & Forman, 2012)—addressing such key issues as privacy protection and encryption—but we still undoubtedly have a very long way to go before consensus practice parameters addressing matters of patient information security can be expected. In the interim, patients participating in behavioral telehealth care must be clearly informed prior to their consent to treatment that the field currently has no consensus on the role and methods of technology in psychological treatment.…”
Section: Toward a Specialty Behavioral Telehealth Care Modelmentioning
confidence: 99%
“…As such, we must be cautious against conducting technology-assisted treatment in the absence of guidance from the broader professional community, particularly given the unique security, privacy, and liability concerns associated with such care. Fortunately, a guiding dialogue has begun to unfold regarding the management of threats to confidentiality (Schwartz & Lonborg, 2011; Yuen et al, 2012)—addressing key issues such as privacy protection and encryption. However, we still have a long way to go.…”
Section: Using the Internet To Deliver Pcit To Home Settingsmentioning
confidence: 99%