A model for information security compliant behaviour in the healthcare context

نویسندگان

  • Debra Box
  • Dalenca Pottas
چکیده

Healthcare professionals are dedicated to maintaining the confidentiality of patient information but are resistant to maintaining an information security compliant environment within a health information system. In this paper, a literature review is used to gain knowledge about the factors that affect this information security compliance. An overview of the security threats and those specific to healthcare is presented. The information security misuse deterrence and compliance promoting factors that affect information security compliant behavior are identified. Their role in strengthening information security compliant behavior is examined. The information security compliance model is introduced and its part in fostering compliant security behavior is reviewed. Its components comprise a body of knowledge, skills and attitude, and behavioural intervention, together with the misuse deterrence and compliance promoting factors. The application of the model is intended to instill, within the user, an attitude that is more conducive to information security compliant behaviour in the healthcare context. © 2014. Published by Elsevier Ltd.Peer-review under responsibility of the Organizing Committees of CENTERIS/ProjMAN/HCIST 2014

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Knowledge Translation in Healthcare – Towards Understanding its True Complexities; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”

This commentary argues that to fully appreciate the complexities of knowledge transfer one firstly has to distinguish between the notions of “data, information, knowledge and wisdom,” and that the latter two are highly context sensitive. In particular one has to understand knowledge as being personal rather than objective, and hence there is no form of knowledge that a-priori is more authoritat...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014