users as the biggest threats to security of health information systems

Authors

a. bakhtiyari-shahri

z. ismail

abstract

there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agenda of threats to his and identify issues and human factors that assist the implementation and adoption of health information security within the developing countries. in doing so, the authors try to provide a cohesive completeness identification of all threats about his and highlight the role of human in all of them. more than 70 threats to his are identified by using a large number of disparate data sources. then they are classified in 30 subjects and finally categorized in seven areas whichuser’s activities are the biggest threat at the core of risks to his.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

full text

Classification of Security Threats in Information Systems

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

full text

Threats to Information Security of Real-Time Disease Surveillance Systems

This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identif...

full text

Workarounds as Means to Identify Insider Threats to Information Systems Security

Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS securi...

full text

Cyber threats to health information systems: A systematic review.

BACKGROUND Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. OBJECTIVE The rationale behind this systematic review is to provide a framework for future research by identifyi...

full text

My Resources

Save resource for easier access later


Journal title:
international journal of communications and information technology

Publisher: university of sistan and baluchestan

ISSN 2322-4606

volume 1

issue 2 2011

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023