메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Security in health information systems: An exploratory comparison of U.S. and Swiss Hospitals

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; HEALTH; HEALTH CARE; HOSPITALS; INFORMATION USE; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 63349110205     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.381     Document Type: Conference Paper
Times cited : (17)

References (24)
  • 1
    • 63349084831 scopus 로고    scopus 로고
    • 2007 Data Breach Stats
    • itrc, San Diego
    • Identity Theft Resource Center, "2007 Data Breach Stats," itrc, San Diego, 2008 http://idtheftmostwanted.org/ITRC%20Breach %20Stats%20Report%202007.pdf
    • (2008)
  • 2
    • 63349093046 scopus 로고    scopus 로고
    • PriceWaterhouseCoopers, 2008 Information Security Breaches Survey, Technical Report, PWC, London, 2008 http://www.pwc.co.uk/pdf/ BERR-ISBS-2008(sml).pdf
    • PriceWaterhouseCoopers, "2008 Information Security Breaches Survey", Technical Report, PWC, London, 2008 http://www.pwc.co.uk/pdf/ BERR-ISBS-2008(sml).pdf
  • 5
    • 51449111763 scopus 로고    scopus 로고
    • Exploring Barriers to Innovation Diffusion in Health Care Service Organizations: An Issue for Effective Integration of Service Architecture and Information
    • IEEE, Los Alamitos
    • T.U. Daim, R.T. Tarman, and N. Basoglu, "Exploring Barriers to Innovation Diffusion in Health Care Service Organizations: An Issue for Effective Integration of Service Architecture and Information," Proceedings of the 41st Hawaii International Conference on System Sciences, IEEE, Los Alamitos, 2008.
    • (2008) Proceedings of the 41st Hawaii International Conference on System Sciences
    • Daim, T.U.1    Tarman, R.T.2    Basoglu, N.3
  • 6
    • 0034699799 scopus 로고    scopus 로고
    • Human-Computer Interactions: Can Computers Improve the Way Doctors Work?
    • C.S. Garrard, "Human-Computer Interactions: Can Computers Improve the Way Doctors Work?", Schweizerische Medizinische Wochen-schrift 130 (42), 2000, pp. 1557-1563.
    • (2000) Schweizerische Medizinische Wochen-schrift , vol.130 , Issue.42 , pp. 1557-1563
    • Garrard, C.S.1
  • 7
    • 11144247155 scopus 로고    scopus 로고
    • U.S. Department of Health & Human Services, Washington
    • U.S. Department of Health & Human Services, "Health Insurance Reform: Security Standards," HHS, Washington, 2003 http://www.cms.hhs.gov/ SecurityStandard/ Downloads/securityfinalrule.pdf
    • (2003) Health Insurance Reform: Security Standards
  • 10
    • 63349089069 scopus 로고    scopus 로고
    • Bundesamt für Sicherheit in der Informations-technik, BSI, Köln
    • Bundesamt für Sicherheit in der Informations-technik, "IT-Grundschutz-Kataloge," BSI, Köln, 2005 http://www.bsi.bund. de/gshb/deutsch/index.htm
    • (2005) IT-Grundschutz-Kataloge
  • 17
    • 63349095788 scopus 로고    scopus 로고
    • The Advisory Board Company, The Advisory Board Company, Washington
    • The Advisory Board Company, Toward Integrated Identity and Access Management, The Advisory Board Company, Washington, 2006.
    • (2006) Toward Integrated Identity and Access Management
  • 18
    • 1842474926 scopus 로고    scopus 로고
    • Authorisation and Access Control for Electronic Health Record Systems
    • B. Blobel, "Authorisation and Access Control for Electronic Health Record Systems," International Journal of Medical Informatics 73 (3), 2004, pp. 251-257.
    • (2004) International Journal of Medical Informatics , vol.73 , Issue.3 , pp. 251-257
    • Blobel, B.1
  • 19
    • 41549129013 scopus 로고    scopus 로고
    • Experiences with Electronic Health Records
    • J.E. Møller and H. Vosegaard, "Experiences with Electronic Health Records," IT Professional 10 (2), 2008, pp. 19-23.
    • (2008) IT Professional , vol.10 , Issue.2 , pp. 19-23
    • Møller, J.E.1    Vosegaard, H.2
  • 20
    • 41549130915 scopus 로고    scopus 로고
    • Medical Record Privacy and Security in a Digital Environment
    • S. Kahn and V. Sheshadri, "Medical Record Privacy and Security in a Digital Environment," IT Professional 10 (2), 2008, pp. 46-52.
    • (2008) IT Professional , vol.10 , Issue.2 , pp. 46-52
    • Kahn, S.1    Sheshadri, V.2
  • 22
    • 63349109231 scopus 로고    scopus 로고
    • ISO, ISO/IEC 17799: Information Technology Security Techniques - Code of Practice for Information Security Management, 2nd ed., ISO, Geneva, 2005.
    • ISO, ISO/IEC 17799: Information Technology Security Techniques - Code of Practice for Information Security Management, 2nd ed., ISO, Geneva, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.