Users as the Biggest Threats to Security of Health Information Systems
Authors
Abstract:
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agenda of threats to HIS and identify issues and human factors that assist the implementation and adoption of health information security within the developing countries. In doing so, the authors try to provide a cohesive completeness identification of all threats about HIS and highlight the role of human in all of them. More than 70 threats to HIS are identified by using a large number of disparate data sources. Then they are classified in 30 subjects and finally categorized in seven areas whichuser’s activities are the biggest threat at the core of risks to HIS.
similar resources
users as the biggest threats to security of health information systems
there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agend...
full textClassification of Security Threats in Information Systems
Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...
full textanalysis of reading comprehension needs of the students of paramedical studies: the case of the students of health information management (him)
چکیده ندارد.
15 صفحه اولThreats to Information Security of Real-Time Disease Surveillance Systems
This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identif...
full textWorkarounds as Means to Identify Insider Threats to Information Systems Security
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS securi...
full textCyber threats to health information systems: A systematic review.
BACKGROUND Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. OBJECTIVE The rationale behind this systematic review is to provide a framework for future research by identifyi...
full textMy Resources
Journal title
volume 1 issue 2
pages 29- 33
publication date 2011-09-20
By following a journal you will be notified via email when a new issue of this journal is published.
Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023