Information security and records management
نویسندگان
چکیده
منابع مشابه
Information Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملA Case for a Partnership Between Information Security and Records Information Management
When picturing the relationship between the information security and the records information management (RIM) teams in many organizations, Aunt Eller, from the Broadway play Oklahoma, singing “The farmer and the cowboy should be friends” comes to mind. Both the farmer and the cowboy had similar interests and could have likely benefited from some collaborative endeavor; however, in many organiza...
متن کاملinformation security requirements for implementing electronic health records in iran
background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...
متن کاملInformation Security Risk Management
The increasing dependence on information networks for business operations has focused managerial attention on managing risks posed by failure of these networks. In this paper, we develop models to assess the risk of failure on the availability of an information network due to attacks that exploit software vulnerabilities. Software vulnerabilities arise from software installed on the nodes of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing and Management
سال: 2006
ISSN: 0021-7298,1347-1597
DOI: 10.1241/johokanri.49.191