A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

نویسندگان

  • Ahmad Bakhtiyari Shahri
  • Zuraini Ismail
چکیده

Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is to present a research agenda of threats to HIS. A cohesive completeness study on the identification of possible threats on HIS was conducted. This study reveals more than 70 threats for HIS. They are classified into 30 common criteria. The abstraction was carried out using secondary data from various research databases. This work-in-progress study will proceed to the next stage of ranking the security threats for assessing risk in HIS. This classification of threats may provide some insights to both researchers and professionals, who are interested in conducting research in risk management of HIS security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

Identification and Prioritization of Hazards and Threats Based on the Risk Matrix Model (Case Study: Assalouyeh region)

Background and objective: The most important step in disaster management is recognizing the correct, accurate and wise of the potential risks and threats that may occur. Rationally, the distribution of limited resources among a lot of hazards and threats is neither feasible nor possible; therefore, at the first the hazards and threats of each region should be identify and prioritize through a r...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Developing a Method for Assessing and Managing the Risk of Covid-19; Rapid Covid-19 Hazard analysis

Background and aims: Work environments are constantly changing under the influence of various factors and newer risks are introduced. Rapid changes in science and technology, increasing the complexity of the industry, increased system integration and other factors have been shown to increase total risk in the past few decades. As well, risk management becomes increasingly critical in decreasing...

متن کامل

Public transport risk assessment through fault tree analysis

This study focused on the public transport risk assessment in District one of ​​Tehran through Fault Tree Analysis involving the three criteria of human, vehicle and road in Haddon matrix. In fact, it examined the factors contributing to the occurrence of road accidents at several urban black spots within District 1. Relying on road safety checklists and survey of experts, this study made an ef...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Information Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012