메뉴 건너뛰기




Volumn 16, Issue 3, 2010, Pages 201-209

Security threats categories in healthcare information systems

Author keywords

healthcare information systems HIS; information security; risk analysis; threats

Indexed keywords

ADMINISTRATIVE PERSONNEL; ARTICLE; COMPUTER SECURITY; COMPUTER SYSTEM; EQUIPMENT; EVALUATION; HOSPITAL DEPARTMENT; HOSPITAL INFORMATION SYSTEM; HUMAN; INFORMATION PROCESSING; INTERVIEW; MALAYSIA; ORGANIZATION AND MANAGEMENT; PUBLIC HOSPITAL; RISK ASSESSMENT;

EID: 77957605604     PISSN: 14604582     EISSN: 17412811     Source Type: Journal    
DOI: 10.1177/1460458210377468     Document Type: Conference Paper
Times cited : (64)

References (22)
  • 1
    • 69849111540 scopus 로고    scopus 로고
    • Paper-based versus computer-based records in the emergency department: Staff preferences, expectations, and concerns
    • Ayotollahi H., Bath AP, Goodacre S. Paper-based versus computer-based records in the emergency department: staff preferences, expectations, and concerns. Health Infor J 2009 ; 15 (3). 199-211.
    • (2009) Health Infor J , vol.15 , Issue.3 , pp. 199-211
    • Ayotollahi, H.1    Bath, A.P.2    Goodacre, S.3
  • 2
    • 84897995044 scopus 로고    scopus 로고
    • Healthcare Information and Management Systems Society (HIMSS). Kroll Fraud Solutions
    • Healthcare Information and Management Systems Society (HIMSS). Analytics report: security of patient data. USA: Kroll Fraud Solutions, 2008.
    • (2008) Analytics Report: Security of Patient Data
  • 4
    • 41549130915 scopus 로고    scopus 로고
    • Medical record privacy and security in a digital environment
    • Kahn S. and Sheshadri V. Medical record privacy and security in a digital environment. IT Pro 2008 ; 46-52.
    • (2008) IT Pro , pp. 46-52
    • Kahn, S.1    Sheshadri, V.2
  • 6
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information system threat categories: The enduring problem of human error
    • Im PG and Baskerville LR A longitudinal study of information system threat categories: the enduring problem of human error. ACM SIGMIS 2005 ; 36 (4). 68-79.
    • (2005) ACM SIGMIS , vol.36 , Issue.4 , pp. 68-79
    • Im, P.G.1    Baskerville, L.R.2
  • 10
    • 0035479209 scopus 로고    scopus 로고
    • Security threats to internet: A Korean multi-industry investigation
    • Jung B., Han I., Lee S. Security threats to internet: a Korean multi-industry investigation. Inf Man 2001 ; 38: 487-498.
    • (2001) Inf Man , vol.38 , pp. 487-498
    • Jung, B.1    Han, I.2    Lee, S.3
  • 11
    • 35048894382 scopus 로고    scopus 로고
    • Vulnerabilities and threats in distributed systems
    • ICDCIT
    • Bhargava B. and Lilien L. Vulnerabilities and threats in distributed systems. ICDCIT 2004 ; LNCS 3347: 146-157.
    • (2004) LNCS , vol.3347 , pp. 146-157
    • Bhargava, B.1    Lilien, L.2
  • 12
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: A cross-industry study
    • Jen Yeh Q. and Ting Chang AJ Threats and countermeasures for information system security: a cross-industry study. Inf Man 2007 ; 44: 480-491.
    • (2007) Inf Man , vol.44 , pp. 480-491
    • Jen Yeh, Q.1    Ting Chang, A.J.2
  • 13
    • 1142292428 scopus 로고    scopus 로고
    • Managing vulnerabilities of information systems to security incidents
    • Farahmand F., Navathe BS, Sharp PG, Enslow HP Managing vulnerabilities of information systems to security incidents. ACM 2009 ; 348-354.
    • (2009) ACM , pp. 348-354
    • Farahmand, F.1    Navathe, B.S.2    Sharp, P.G.3    Enslow, H.P.4
  • 14
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman EM Enemy at the gate: threats to information security. Comm ACM 2003 ; 46 (6). 91-95.
    • (2003) Comm ACM , vol.46 , Issue.6 , pp. 91-95
    • Whitman, E.M.1
  • 15
    • 34547810494 scopus 로고    scopus 로고
    • Danger is in the eye of the beholders: Social representations of information systems security in healthcare
    • Vaast E. Danger is in the eye of the beholders: social representations of information systems security in healthcare. J Strat Inf Syst 2007 ; 16: 130-152.
    • (2007) J Strat Inf Syst , vol.16 , pp. 130-152
    • Vaast, E.1
  • 16
    • 33750686630 scopus 로고    scopus 로고
    • Risk analysis of a patient monitoring system using Bayesian network modelling
    • Maglogiannis I., Zafiropoulos E., Platis A., Lambrinoudakis C. Risk analysis of a patient monitoring system using Bayesian network modelling. J Biomed Inf 2006 ; 39: 637-647.
    • (2006) J Biomed Inf , vol.39 , pp. 637-647
    • Maglogiannis, I.1    Zafiropoulos, E.2    Platis, A.3    Lambrinoudakis, C.4
  • 21
    • 34447542239 scopus 로고    scopus 로고
    • Risk analysis of information security in mobile instant messaging and presence system for healthcare
    • Bones E., Hasvold P., Henriksen E., Strandenaes T. Risk analysis of information security in mobile instant messaging and presence system for healthcare. Int J Med Inform 2007 ; 76: 677-687.
    • (2007) Int J Med Inform , vol.76 , pp. 677-687
    • Bones, E.1    Hasvold, P.2    Henriksen, E.3    Strandenaes, T.4
  • 22
    • 77957550627 scopus 로고    scopus 로고
    • Risk management AS/NZS 4360:1999. Strathfield, NSW: Standards Association of Australia ; 1999
    • Risk management AS/NZS 4360:1999. Strathfield, NSW: Standards Association of Australia ; 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.