메뉴 건너뛰기




Volumn 6, Issue 2-4, 2011, Pages 95-116

A risk management model for securing virtual healthcare communities

Author keywords

Healthcare; Information security; ISO 27000 family of standards; Risk assessment; Virtual communities

Indexed keywords

ARTICLE; CAREGIVER; COMPUTER INTERFACE; COMPUTER SECURITY; CONFIDENTIALITY; ELECTRONIC MEDICAL RECORD; HEALTH CARE DELIVERY; HEALTH CARE PERSONNEL; HEALTH SERVICES RESEARCH; HUMAN; INFORMATION SYSTEM; INTERNET; ORGANIZATION AND MANAGEMENT; PATIENT; RISK MANAGEMENT;

EID: 84857173875     PISSN: 17418453     EISSN: 17418461     Source Type: Journal    
DOI: 10.1504/IJEH.2011.044344     Document Type: Article
Times cited : (3)

References (31)
  • 1
    • 84898301616 scopus 로고    scopus 로고
    • A holistic perspective of security in health related virtual communities
    • Lazakidou, A. and Siassiakos, K. (Eds) IGI Global, Hershey, PA, USA
    • Apostolakis, I., Chryssanthou, A. and Varlamis, I. (2009) 'A holistic perspective of security in health related virtual communities', in Lazakidou, A. and Siassiakos, K. (Eds): Handbook of Research on Distributed Medical Informatics and E-Health, IGI Global, Hershey, PA, USA, pp.367-381.
    • (2009) Handbook of Research on Distributed Medical Informatics and E-health , pp. 367-381
    • Apostolakis, I.1    Chryssanthou, A.2    Varlamis, I.3
  • 2
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management applied to electronic health records
    • Paper presented at 28-30 June, Asilomar Conference Center, Pacific Grove, CA, USA
    • Becker, M.Y. and Sewell, P. (2004) 'Cassandra: flexible trust management applied to electronic health records'. Paper presented at the 17th IEEE Workshop on Computer Security Foundations, 28-30 June, Asilomar Conference Center, Pacific Grove, CA, USA.
    • (2004) The 17th IEEE Workshop on Computer Security Foundations
    • Becker, M.Y.1    Sewell, P.2
  • 6
    • 12344338236 scopus 로고    scopus 로고
    • Trust in virtual healthcare communities: Design and implementation of trust-enabling functionalities
    • Paper presented 5-8 January, Big Island, Hawaii
    • Ebner, W., Leimeister, J.M. and Krcmar, H. (2004) 'Trust in virtual healthcare communities: design and implementation of trust-enabling functionalities', Paper presented at the 37th Hawaii International Conference on System Sciences (HICSS 04) - Track 7, 5-8 January, Big Island, Hawaii.
    • (2004) The 37th Hawaii International Conference on System Sciences (HICSS 04) - Track , vol.7
    • Ebner, W.1    Leimeister, J.M.2    Krcmar, H.3
  • 7
    • 79957729771 scopus 로고
    • Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Council (N.I. 281/31-23/11/1995)
    • European Council (1995) 'Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data' (N.I. 281/31-23/11/1995), Official Journal of the European Communities.
    • (1995) Official Journal of the European Communities
  • 14
    • 41549130915 scopus 로고    scopus 로고
    • Medical record privacy and security in a digital environment
    • DOI 10.1109/MITP.2008.34, 4476253
    • Kahn, S. and Sheshadri, V. (2008) 'Medical record privacy and security in a digital environment', IEEE Journal of IT Professional, Vol. 10, No. 2, pp.46-52. (Pubitemid 351467591)
    • (2008) IT Professional , vol.10 , Issue.2 , pp. 46-52
    • Kahn, S.1    Sheshadri, V.2
  • 15
    • 74049096945 scopus 로고    scopus 로고
    • Group unveils first-of-its-kind standard to secure patient data
    • online (accessed 20 June 2011)
    • Kaplan, D. (2009) 'Group unveils first-of-its-kind standard to secure patient data', SC Magazine. Available online at http://www.scmagazineus.com/ group-unveils-first-of-its-kind-standard-to-secure-patient-data/article/128168/ (accessed 20 June 2011).
    • (2009) SC Magazine
    • Kaplan, D.1
  • 18
    • 84857222740 scopus 로고    scopus 로고
    • Law 3418 Pub. L. No. 3418, Greece
    • Law 3418 (2005) Medical Code of Deontology, Pub. L. No. 3418, Greece.
    • (2005) Medical Code of Deontology
  • 20
    • 84870497163 scopus 로고    scopus 로고
    • Understanding security threats in virtual worlds
    • Paper presented at 6-9 August, San Francisco, USA
    • Lee, C.Y. (2009) 'Understanding security threats in virtual worlds', Paper presented at the 15th Americas Conference on Information Systems (AMCIS), 6-9 August, San Francisco, USA.
    • (2009) The 15th Americas Conference on Information Systems (AMCIS)
    • Lee, C.Y.1
  • 23
    • 85001799450 scopus 로고    scopus 로고
    • Analyzing the vulnerability of U.S. hospitals to social engineering attacks: How many of your employees would share their password?
    • Medlin, D.B., Cazier, J.A. and Foulk, D.P. (2008) 'Analyzing the vulnerability of U.S. hospitals to social engineering attacks: how many of your employees would share their password?', International Journal of Information Security and Privacy, Vol. 2, No. 3, pp.71-83.
    • (2008) International Journal of Information Security and Privacy , vol.2 , Issue.3 , pp. 71-83
    • Medlin, D.B.1    Cazier, J.A.2    Foulk, D.P.3
  • 24
    • 84857211850 scopus 로고    scopus 로고
    • online (accessed 20 June 2011)
    • Mondy, J. and Torresi, M. (2008) 'CIGNA creating a virtual health care community', Cigna website, news releases. Available online at: http://newsroom.cigna.com/article-display.cfm?article-id=925 (accessed 20 June 2011).
    • (2008) CIGNA Creating a Virtual Health Care Community
    • Mondy, J.1    Torresi, M.2
  • 25
    • 33745853759 scopus 로고    scopus 로고
    • Security issues of wireless sensor networks in healthcare applications
    • DOI 10.1007/s10550-006-0051-8
    • Ng, H.S., Sim, M.L. and Tan, C.M. (2006) 'Security issues of wireless sensor networks in healthcare applications', BT Technology Journal, Vol. 24, No. 2, pp.138-144. (Pubitemid 44027470)
    • (2006) BT Technology Journal , vol.24 , Issue.2 , pp. 138-144
    • Ng, H.S.1    Sim, M.L.2    Tan, C.M.3
  • 26
    • 77957605604 scopus 로고    scopus 로고
    • Security threats categories in healthcare information systems
    • Samy, G.N., Ahmad, R. and Ismail, Z. (2010) 'Security threats categories in healthcare information systems', Health Informatics Journal, Vol. 16, No. 3, pp.201-209.
    • (2010) Health Informatics Journal , vol.16 , Issue.3 , pp. 201-209
    • Samy, G.N.1    Ahmad, R.2    Ismail, Z.3
  • 28
    • 0031602788 scopus 로고    scopus 로고
    • The legal and ethical aspects of telemedicine. Data protection, security and European law
    • Stanberry, B. (1998) 'The legal and ethical aspects of telemedicine. Data protection, security and European law', Journal of Telemedicine and Telecare, Vol. 4, No. 1, pp.18-24.
    • (1998) Journal of Telemedicine and Telecare , vol.4 , Issue.1 , pp. 18-24
    • Stanberry, B.1
  • 29
    • 84857203229 scopus 로고    scopus 로고
    • U.S. Congress (H. REPT. 104-736), Government Printing Office, Washington, DC
    • U.S. Congress (2004) Health Insurance Portability and Accountability Act (H. REPT. 104-736), Government Printing Office, Washington, DC.
    • (2004) Health Insurance Portability and Accountability Act
  • 31
    • 34047125188 scopus 로고    scopus 로고
    • End-to-end Security in Telemedical Networks - A Practical Guideline
    • DOI 10.1016/j.ijmedinf.2006.09.020, PII S138650560600222X
    • Wozak, F., Schabetsberger, T. and Ammenwerth, E (2007) 'End-to-end security in telemedical networks - a practical guideline', International Journal on Medical Informatics, Vol. 76, Nos. 5/6, pp.484-490. (Pubitemid 46509757)
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 484-490
    • Wozak, F.1    Schabetsberger, T.2    Ammmenwerth, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.