메뉴 건너뛰기




Volumn 84, Issue 6, 2015, Pages 454-467

Analysis of health professional security behaviors in a real clinical setting: An empirical study

Author keywords

Health personnel; Personal health information; Privacy; Security; Surveys

Indexed keywords

DATA PRIVACY; HEALTH; HEALTH CARE; HOSPITALS; SECURITY SYSTEMS; SURVEYING; SURVEYS;

EID: 84927070214     PISSN: 13865056     EISSN: 18728243     Source Type: Journal    
DOI: 10.1016/j.ijmedinf.2015.01.010     Document Type: Article
Times cited : (44)

References (106)
  • 1
    • 0003699872 scopus 로고    scopus 로고
    • The National Academies Press
    • Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Commission on Physical Sciences, Mathematics, and Applications, National Research Council For the Record: Protecting Electronic Health Information 1997, The National Academies Press.
    • (1997) For the Record: Protecting Electronic Health Information
  • 2
    • 80455156922 scopus 로고    scopus 로고
    • Information security and privacy in healthcare: current state of research
    • Appari A., Johnson M.E. Information security and privacy in healthcare: current state of research. Int. J. Internet Enterp. Manag. 2010, 6(4):279-314.
    • (2010) Int. J. Internet Enterp. Manag. , vol.6 , Issue.4 , pp. 279-314
    • Appari, A.1    Johnson, M.E.2
  • 3
    • 84926959769 scopus 로고    scopus 로고
    • (accessed 04.08.13)
    • European Network and Information Security Agency ENISA Threat Landscape. Responding to the Evolving Threat Environment 2012, Available from http://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/ENISA_Threat_Landscape/at_download/fullReport (accessed 04.08.13).
    • (2012) ENISA Threat Landscape. Responding to the Evolving Threat Environment
  • 4
    • 84859116351 scopus 로고    scopus 로고
    • Medical data breaches: notification delayed is notification denied
    • Kierkegaard P. Medical data breaches: notification delayed is notification denied. Comput. Law Secur. Rev. 2012, 28(2):163-183.
    • (2012) Comput. Law Secur. Rev. , vol.28 , Issue.2 , pp. 163-183
    • Kierkegaard, P.1
  • 5
    • 47949102642 scopus 로고    scopus 로고
    • Using a game to introduce lightweight requirements engineering
    • IEEE Computer Society Press, New Delhi, India
    • Smith R., Gotel O. Using a game to introduce lightweight requirements engineering. 15th IEEE International Requirements Engineering Conference 2007, 379-380. IEEE Computer Society Press, New Delhi, India.
    • (2007) 15th IEEE International Requirements Engineering Conference , pp. 379-380
    • Smith, R.1    Gotel, O.2
  • 6
    • 63049132678 scopus 로고    scopus 로고
    • How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
    • Liginlal D., Sim I., Khansa L. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Comput. Secur. 2009, 28(3-4):215-228.
    • (2009) Comput. Secur. , vol.28 , Issue.3-4 , pp. 215-228
    • Liginlal, D.1    Sim, I.2    Khansa, L.3
  • 7
    • 84927092719 scopus 로고    scopus 로고
    • (accessed 04.10.13).
    • Privacy Rights Clearinghouse, 2013. Available from https://www.privacyrights.org/data-breach (accessed 04.10.13).
    • (2013)
  • 8
    • 74549207114 scopus 로고    scopus 로고
    • (accessed 04.02.14)
    • U.S.Department of Health & Human Services Health Information Privacy 2014, Available from http://www.hhs.gov/ocr/privacy/ (accessed 04.02.14).
    • (2014) Health Information Privacy
  • 9
    • 84927032653 scopus 로고    scopus 로고
    • (accessed 04.02.14)
    • HealthIT Health Information Technology 2013, Available from http://www.healthit.gov/ (accessed 04.02.14).
    • (2013) Health Information Technology
  • 11
    • 84878197970 scopus 로고    scopus 로고
    • Security and privacy in electronic health records: a systematic literature review
    • Fernández-Alemán J.L., Señor I.C., Lozoya P.A.O., Toval A. Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 2013, 46(3):541-562.
    • (2013) J. Biomed. Inform. , vol.46 , Issue.3 , pp. 541-562
    • Fernández-Alemán, J.L.1    Señor, I.C.2    Lozoya, P.A.O.3    Toval, A.4
  • 12
    • 84865392413 scopus 로고    scopus 로고
    • [Access control management in electronic health records: a systematic literature review]
    • Carrion Senor I., Fernandez-Aleman J.L., Toval A. [Access control management in electronic health records: a systematic literature review]. Gac. Sanit. 2012, 26(5):463-468.
    • (2012) Gac. Sanit. , vol.26 , Issue.5 , pp. 463-468
    • Carrion Senor, I.1    Fernandez-Aleman, J.L.2    Toval, A.3
  • 13
    • 57649095360 scopus 로고    scopus 로고
    • In a 'trusting' environment, everyone is responsible for information security
    • Williams P.A.H. In a 'trusting' environment, everyone is responsible for information security. Inf. Secur. Tech. Rep. 2008, 13(4):207-215.
    • (2008) Inf. Secur. Tech. Rep. , vol.13 , Issue.4 , pp. 207-215
    • Williams, P.A.H.1
  • 14
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: the insider threat - who can you trust these days?
    • Colwill C. Human factors in information security: the insider threat - who can you trust these days?. Inf. Secur. Tech. Rep. 2009, 14(4):186-196.
    • (2009) Inf. Secur. Tech. Rep. , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 15
    • 84859942981 scopus 로고    scopus 로고
    • Healthcare professionals' organisational barriers to health information technologies-a literature review
    • Lluch M. Healthcare professionals' organisational barriers to health information technologies-a literature review. Int. J. Med. Inform. 2011, 80(12):849-862.
    • (2011) Int. J. Med. Inform. , vol.80 , Issue.12 , pp. 849-862
    • Lluch, M.1
  • 16
    • 70349448077 scopus 로고    scopus 로고
    • Human and organizational factors in computer and information security: pathways to vulnerabilities
    • Kraemer S., Carayon P., Clem J. Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput. Secur. 2009, 28(7):509-520.
    • (2009) Comput. Secur. , vol.28 , Issue.7 , pp. 509-520
    • Kraemer, S.1    Carayon, P.2    Clem, J.3
  • 17
    • 13844266517 scopus 로고    scopus 로고
    • Internet security and privacy protection for the health care professional
    • Alban R.F., Feldmar D., Gabbay J., Lefor A.T. Internet security and privacy protection for the health care professional. Curr. Surg. 2005, 62(1):106-110.
    • (2005) Curr. Surg. , vol.62 , Issue.1 , pp. 106-110
    • Alban, R.F.1    Feldmar, D.2    Gabbay, J.3    Lefor, A.T.4
  • 18
    • 84927041395 scopus 로고    scopus 로고
    • Department of Health and Human Services, Available from(accessed 04.02.14)
    • The Office of the National Coordinator for Health Information Technology Guide to Privacy and Security of Health Information 2014, Department of Health and Human Services, Available from http://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdf (accessed 04.02.14).
    • (2014) Guide to Privacy and Security of Health Information
  • 20
    • 77956057059 scopus 로고    scopus 로고
    • Security requirements and solutions in electronic health records: lessons learned from a comparative study
    • Farzandipour M., Sadoughi F., Ahmadi M., Karimi I. Security requirements and solutions in electronic health records: lessons learned from a comparative study. J. Med. Syst. 2010, 34(4):629-642.
    • (2010) J. Med. Syst. , vol.34 , Issue.4 , pp. 629-642
    • Farzandipour, M.1    Sadoughi, F.2    Ahmadi, M.3    Karimi, I.4
  • 21
    • 71549131048 scopus 로고    scopus 로고
    • Clinician assessments of workplace security training - an informatics perspective
    • Fernando J., Dawson L. Clinician assessments of workplace security training - an informatics perspective. Electron. J. Health Inform. 2008, 3(1):e7.
    • (2008) Electron. J. Health Inform. , vol.3 , Issue.1 , pp. e7
    • Fernando, J.1    Dawson, L.2
  • 22
    • 79952500732 scopus 로고    scopus 로고
    • The human element: training, awareness, and human resources implications of health information security policy under the Health Insurance Portability and Accountability Act (HIPAA)
    • ACM
    • Jeremy S.C. The human element: training, awareness, and human resources implications of health information security policy under the Health Insurance Portability and Accountability Act (HIPAA). Information Security Curriculum Development Conference (InfoSecCD'09) 2009, 95-99. ACM.
    • (2009) Information Security Curriculum Development Conference (InfoSecCD'09) , pp. 95-99
    • Jeremy, S.C.1
  • 23
    • 71549166995 scopus 로고    scopus 로고
    • The health information system security threat lifecycle: an informatics theory
    • Fernando J.I., Dawson L.L. The health information system security threat lifecycle: an informatics theory. Int. J. Med. Inform. 2009, 78(12):815-826.
    • (2009) Int. J. Med. Inform. , vol.78 , Issue.12 , pp. 815-826
    • Fernando, J.I.1    Dawson, L.L.2
  • 24
    • 1842582058 scopus 로고    scopus 로고
    • Health informatics education for clinicians and managers-what's holding up progress?
    • Murphy J., Stramer K., Clamp S., Grubb P., Gosland J., Davis S. Health informatics education for clinicians and managers-what's holding up progress?. Int. J. Med. Inform. 2004, 73(2):205-213.
    • (2004) Int. J. Med. Inform. , vol.73 , Issue.2 , pp. 205-213
    • Murphy, J.1    Stramer, K.2    Clamp, S.3    Grubb, P.4    Gosland, J.5    Davis, S.6
  • 25
    • 84858154228 scopus 로고    scopus 로고
    • Perspectives of Australian adults about protecting the privacy of their health information in statistical databases
    • King T., Brankovic L., Gillard P. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int. J. Med. Inform. 2012, 81(4):279-289.
    • (2012) Int. J. Med. Inform. , vol.81 , Issue.4 , pp. 279-289
    • King, T.1    Brankovic, L.2    Gillard, P.3
  • 26
    • 84891826514 scopus 로고    scopus 로고
    • The natural hospital environment: a socio-technical-material perspective
    • Fernando J., Dawson L. The natural hospital environment: a socio-technical-material perspective. Int. J. Med. Inform. 2014, 83(2):140-158.
    • (2014) Int. J. Med. Inform. , vol.83 , Issue.2 , pp. 140-158
    • Fernando, J.1    Dawson, L.2
  • 28
    • 35348898546 scopus 로고    scopus 로고
    • The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors
    • McAlearney A.S., Chisolm D.J., Schweikhart S., Medow M.A., Kelleher K. The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors. Int. J. Med. Inform. 2007, 76(11-12):836-842.
    • (2007) Int. J. Med. Inform. , vol.76 , Issue.11-12 , pp. 836-842
    • McAlearney, A.S.1    Chisolm, D.J.2    Schweikhart, S.3    Medow, M.A.4    Kelleher, K.5
  • 29
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • Carstens D., McCauley-Bell P., Malone L., DeMara R. Evaluation of the human impact of password authentication practices on information security. Inf. Sci. 2004, 7:67-85.
    • (2004) Inf. Sci. , vol.7 , pp. 67-85
    • Carstens, D.1    McCauley-Bell, P.2    Malone, L.3    DeMara, R.4
  • 30
    • 84877963990 scopus 로고    scopus 로고
    • Monitoring information security risks within health care
    • van Deursen N., Buchanan W.J., Duff A. Monitoring information security risks within health care. Comput. Secur. 2013, 37:31-45.
    • (2013) Comput. Secur. , vol.37 , pp. 31-45
    • van Deursen, N.1    Buchanan, W.J.2    Duff, A.3
  • 31
    • 84973703306 scopus 로고
    • The health belief model and preventive health behavior
    • Rosenstock I.M. The health belief model and preventive health behavior. Health Educ. Monogr. 1974, 2:420-432.
    • (1974) Health Educ. Monogr. , vol.2 , pp. 420-432
    • Rosenstock, I.M.1
  • 32
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: linking information security climate to compliant behavior
    • Chan M., Woon I., Kankanhalli A. Perceptions of information security in the workplace: linking information security climate to compliant behavior. J. Inf. Priv. Secur. 2005, 1(3):18.
    • (2005) J. Inf. Priv. Secur. , vol.1 , Issue.3 , pp. 18
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 33
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: a health belief perspective
    • Ng B.-Y., Kankanhalli A., Xu Y. Studying users' computer security behavior: a health belief perspective. Decis. Support Syst. 2009, 46(4):815-825.
    • (2009) Decis. Support Syst. , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3
  • 35
    • 24644439555 scopus 로고    scopus 로고
    • Information security policy's impact on reporting security incidents
    • Wiant T.L. Information security policy's impact on reporting security incidents. Comput. Secur. 2005, 24(6):448-459.
    • (2005) Comput. Secur. , vol.24 , Issue.6 , pp. 448-459
    • Wiant, T.L.1
  • 36
    • 79953706576 scopus 로고    scopus 로고
    • Challenges surrounding provider/client electronic-mail communication
    • Facchiano L., Snyder C.H. Challenges surrounding provider/client electronic-mail communication. J. Nurse Pract. 2011, 7(4):309-315.
    • (2011) J. Nurse Pract. , vol.7 , Issue.4 , pp. 309-315
    • Facchiano, L.1    Snyder, C.H.2
  • 38
    • 77954313605 scopus 로고    scopus 로고
    • E-mail in patient-provider communication: a systematic review
    • Ye J., Rust G., Fry-Johnson Y., Strothers H. E-mail in patient-provider communication: a systematic review. Patient Educ. Couns. 2010, 80(2):266-273.
    • (2010) Patient Educ. Couns. , vol.80 , Issue.2 , pp. 266-273
    • Ye, J.1    Rust, G.2    Fry-Johnson, Y.3    Strothers, H.4
  • 41
    • 84892495781 scopus 로고    scopus 로고
    • New attacks and security model of the secure flash disk
    • Wang A., Li Z., Yang X., Yu Y. New attacks and security model of the secure flash disk. Math. Comput. Model. 2013, 57(11-12):2605-2612.
    • (2013) Math. Comput. Model. , vol.57 , Issue.11-12 , pp. 2605-2612
    • Wang, A.1    Li, Z.2    Yang, X.3    Yu, Y.4
  • 42
    • 84927092718 scopus 로고    scopus 로고
    • (accessed 25.04.14)
    • HealthcareInfoSecurity Healthcare Information Security Today 2013, Available from http://docs.ismgcorp.com/files/handbooks/HIS-Survey-2012/HIS_Survey_Report_2012.pdf (accessed 25.04.14).
    • (2013) Healthcare Information Security Today
  • 43
    • 24144454227 scopus 로고    scopus 로고
    • USB & other portable storage device usage: be aware of the risks to your corporate data in order to take pre-emptive and/or corrective action
    • Gorge M. USB & other portable storage device usage: be aware of the risks to your corporate data in order to take pre-emptive and/or corrective action. Comput. Fraud Secur. 2005, 2005(8):15-17.
    • (2005) Comput. Fraud Secur. , vol.2005 , Issue.8 , pp. 15-17
    • Gorge, M.1
  • 45
    • 0033277446 scopus 로고    scopus 로고
    • Password security: an empirical study
    • Zviran M., Haga W.J. Password security: an empirical study. J. Manag. Inf. Syst. 1999, 15(4):161-185.
    • (1999) J. Manag. Inf. Syst. , vol.15 , Issue.4 , pp. 161-185
    • Zviran, M.1    Haga, W.J.2
  • 47
    • 70149084205 scopus 로고    scopus 로고
    • ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management
    • ISO/IEC 27002:2005 - Information technology - Security techniques - Code of practice for information security management.
  • 54
    • 62749139692 scopus 로고    scopus 로고
    • Design, application and testing of the Work Observation Method by Activity Timing (WOMBAT) to measure clinicians' patterns of work and communication
    • Westbrook J.I., Ampt A. Design, application and testing of the Work Observation Method by Activity Timing (WOMBAT) to measure clinicians' patterns of work and communication. Int. J. Med. Inform. 2009, 78(Suppl. 1):S25-S33.
    • (2009) Int. J. Med. Inform. , vol.78 , pp. S25-S33
    • Westbrook, J.I.1    Ampt, A.2
  • 56
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: influence of proactive password restrictions
    • Proctor R.W., Lien M.C., Vu K.P., Schultz E.E., Salvendy G. Improving computer security for authentication of users: influence of proactive password restrictions. Behav. Res. Methods Instrum. Comput. 2002, 34(2):163-169.
    • (2002) Behav. Res. Methods Instrum. Comput. , vol.34 , Issue.2 , pp. 163-169
    • Proctor, R.W.1    Lien, M.C.2    Vu, K.P.3    Schultz, E.E.4    Salvendy, G.5
  • 57
    • 84870830753 scopus 로고    scopus 로고
    • Passwords usage and human memory limitations: a survey across age and educational background
    • Pilar D.R., Jaeger A., Gomes C.F., Stein L.M. Passwords usage and human memory limitations: a survey across age and educational background. PLoS ONE 2012, 7(12):e51067.
    • (2012) PLoS ONE , vol.7 , Issue.12 , pp. e51067
    • Pilar, D.R.1    Jaeger, A.2    Gomes, C.F.3    Stein, L.M.4
  • 58
    • 77955231421 scopus 로고    scopus 로고
    • Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords
    • Nelson D., Vu K.-P.L. Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords. CHB 2010, 26(4):705-715.
    • (2010) CHB , vol.26 , Issue.4 , pp. 705-715
    • Nelson, D.1    Vu, K.-P.L.2
  • 59
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • Ives B., Walsh K.R., Schneider H. The domino effect of password reuse. Commun. ACM 2004, 47(4):75-78.
    • (2004) Commun. ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 60
    • 84926955578 scopus 로고    scopus 로고
    • College Bescherming Persoonsgegevens, Inspectie voor de Gezondheidszorg, Den Haag, Available from(accessed 04.02.14)
    • Beuving J. IGZ/CBP. Informatiebeveiliging in ziekenhuizen voldoet niet aan de norm 2008, College Bescherming Persoonsgegevens, Inspectie voor de Gezondheidszorg, Den Haag, Available from http://www.cbpweb.nl/downloads_rapporten/rap_2008_informatiebeveiliging_ziekenhuizen.pdf (accessed 04.02.14).
    • (2008) IGZ/CBP. Informatiebeveiliging in ziekenhuizen voldoet niet aan de norm
    • Beuving, J.1
  • 62
    • 84927073844 scopus 로고    scopus 로고
    • Virus and spam protection
    • Digital Press, Burlington, (Chapter 9)
    • Haletky E. Virus and spam protection. Deploying LINUX on the Desktop 2005, 141-150. Digital Press, Burlington, (Chapter 9).
    • (2005) Deploying LINUX on the Desktop , pp. 141-150
    • Haletky, E.1
  • 63
    • 29344440765 scopus 로고    scopus 로고
    • Email security best practice
    • Sunner M. Email security best practice. Netw. Secur. 2005, 2005(12):4-7.
    • (2005) Netw. Secur. , vol.2005 , Issue.12 , pp. 4-7
    • Sunner, M.1
  • 65
    • 84927001663 scopus 로고    scopus 로고
    • The Radicati Group I. Email Statistics Report, 2013-2017
    • (accessed 04.02.14).
    • The Radicati Group I. Email Statistics Report, 2013-2017, Available from (accessed 04.02.14). http://www.radicati.com/.
  • 67
    • 33751182886 scopus 로고    scopus 로고
    • "You've got mail!": the role of e-mail in clinical breast surgical practice
    • Guth A.A., Diflo T. "You've got mail!": the role of e-mail in clinical breast surgical practice. Breast 2006, 15(6):713-717.
    • (2006) Breast , vol.15 , Issue.6 , pp. 713-717
    • Guth, A.A.1    Diflo, T.2
  • 68
    • 84865760248 scopus 로고    scopus 로고
    • P2P as a CDN: a new service model for file sharing
    • Mondal A., Trestian I., Qin Z., Kuzmanovic A. P2P as a CDN: a new service model for file sharing. Comput. Netw. 2012, 56(14):3233-3246.
    • (2012) Comput. Netw. , vol.56 , Issue.14 , pp. 3233-3246
    • Mondal, A.1    Trestian, I.2    Qin, Z.3    Kuzmanovic, A.4
  • 72
    • 70349459633 scopus 로고    scopus 로고
    • Defending passive worms in unstructured P2P networks based on healthy file dissemination
    • Wang F., Zhang Y., Ma J. Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput. Secur. 2009, 28(7):628-636.
    • (2009) Comput. Secur. , vol.28 , Issue.7 , pp. 628-636
    • Wang, F.1    Zhang, Y.2    Ma, J.3
  • 74
    • 84865613927 scopus 로고    scopus 로고
    • A survey on security issues of reputation management systems for peer-to-peer networks
    • Selvaraj C., Anand S. A survey on security issues of reputation management systems for peer-to-peer networks. Comput. Sci. Rev. 2012, 6(4):145-160.
    • (2012) Comput. Sci. Rev. , vol.6 , Issue.4 , pp. 145-160
    • Selvaraj, C.1    Anand, S.2
  • 75
    • 84980566608 scopus 로고    scopus 로고
    • News: advertising malware scammers get smarter
    • News: advertising malware scammers get smarter. Netw. Secur. 2009, 2009(10):19-20.
    • (2009) Netw. Secur. , vol.2009 , Issue.10 , pp. 19-20
  • 76
    • 84864413758 scopus 로고    scopus 로고
    • Modeling and analysis of the spread of computer virus
    • Zhu Q., Yang X., Ren J. Modeling and analysis of the spread of computer virus. Commun. Nonlinear Sci. Numer. Simul. 2012, 17(12):5117-5124.
    • (2012) Commun. Nonlinear Sci. Numer. Simul. , vol.17 , Issue.12 , pp. 5117-5124
    • Zhu, Q.1    Yang, X.2    Ren, J.3
  • 77
    • 84927118157 scopus 로고    scopus 로고
    • USB-based virus/malicious code launch
    • Syngress, Boston, (Chapter 3)
    • Anderson B., Anderson B. USB-based virus/malicious code launch. Seven Deadliest USB Attacks 2010, 65-96. Syngress, Boston, (Chapter 3).
    • (2010) Seven Deadliest USB Attacks , pp. 65-96
    • Anderson, B.1    Anderson, B.2
  • 78
    • 84886466692 scopus 로고    scopus 로고
    • Kroll Fraud Solutions, Available from(accessed 04.02.14)
    • HIMSS Analytics Report: Security of Patient Data 2012, Kroll Fraud Solutions, Available from http://www.krollcybersecurity.com/media/Kroll-HIMSS_2012_-_Security_of_Patient_Data_040912.pdf (accessed 04.02.14).
    • (2012) HIMSS Analytics Report: Security of Patient Data
  • 81
    • 84864572697 scopus 로고    scopus 로고
    • Trust me. I am a Doctor. Your records are safe?
    • SECAU - Security Research Centre, Edith Cowan University, Mount Lawley, Western Australia
    • Williams P., Valli C. Trust me. I am a Doctor. Your records are safe?. Sixth Australian Information Security Management Conference 2008, 155-162. SECAU - Security Research Centre, Edith Cowan University, Mount Lawley, Western Australia.
    • (2008) Sixth Australian Information Security Management Conference , pp. 155-162
    • Williams, P.1    Valli, C.2
  • 82
    • 60649102513 scopus 로고    scopus 로고
    • A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting
    • Yoon-Flannery K., Zandieh S.O., Kuperman G.J., Langsam D.J., Hyman D., Kaushal R. A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting. Inform. Prim. Care 2008, 16(4):277-284.
    • (2008) Inform. Prim. Care , vol.16 , Issue.4 , pp. 277-284
    • Yoon-Flannery, K.1    Zandieh, S.O.2    Kuperman, G.J.3    Langsam, D.J.4    Hyman, D.5    Kaushal, R.6
  • 84
    • 84926994514 scopus 로고    scopus 로고
    • U.S. Department of Health & Human Services, Available from(accessed 04.02.14)
    • The Office of the National Coordinator for Health Information Technology's Office of the Chief Privacy Officer Cybersecure: Your Medical Practice 2012, U.S. Department of Health & Human Services, Available from http://www.healthit.gov/sites/default/files/cybersecure/cybersecure.html (accessed 04.02.14).
    • (2012) Cybersecure: Your Medical Practice
  • 85
    • 0348111346 scopus 로고    scopus 로고
    • Nurses resisting information technology
    • Timmons S. Nurses resisting information technology. Nurs. Inq. 2003, 10(4):257-269.
    • (2003) Nurs. Inq. , vol.10 , Issue.4 , pp. 257-269
    • Timmons, S.1
  • 86
    • 42949116497 scopus 로고    scopus 로고
    • Learning from error: identifying contributory causes of medication errors in an Australian hospital
    • Nichols P., Copeland T.S., Craib I.A., Hopkins P., Bruce D.G. Learning from error: identifying contributory causes of medication errors in an Australian hospital. Med. J. Aust. 2008, 188(5):276-279.
    • (2008) Med. J. Aust. , vol.188 , Issue.5 , pp. 276-279
    • Nichols, P.1    Copeland, T.S.2    Craib, I.A.3    Hopkins, P.4    Bruce, D.G.5
  • 87
    • 53049103408 scopus 로고    scopus 로고
    • Information security requirements - interpreting the legal aspects
    • Gerber M., von Solms R. Information security requirements - interpreting the legal aspects. Comput. Secur. 2008, 27(5-6):124-135.
    • (2008) Comput. Secur. , vol.27 , Issue.5-6 , pp. 124-135
    • Gerber, M.1    von Solms, R.2
  • 88
    • 77957881878 scopus 로고    scopus 로고
    • Collaborative risk method for information security management practices: a case context within Turkey
    • Ozkan S., Karabacak B. Collaborative risk method for information security management practices: a case context within Turkey. Int. J. Inf. Manag. 2010, 30(6):567-572.
    • (2010) Int. J. Inf. Manag. , vol.30 , Issue.6 , pp. 567-572
    • Ozkan, S.1    Karabacak, B.2
  • 89
    • 84875468070 scopus 로고    scopus 로고
    • A VIKOR technique based on DEMATEL and ANP for information security risk control assessment
    • Ou Yang Y.-P., Shieh H.-M., Tzeng G.-H. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf. Sci. 2013, 232:482-500.
    • (2013) Inf. Sci. , vol.232 , pp. 482-500
    • Ou Yang, Y.-P.1    Shieh, H.-M.2    Tzeng, G.-H.3
  • 91
    • 84869493217 scopus 로고    scopus 로고
    • Impact of standards adoption on healthcare transaction performance: the case of HIPAA
    • Iossifova A.R., Meyer-Goldstein S. Impact of standards adoption on healthcare transaction performance: the case of HIPAA. Int. J. Prod. Econ. 2013, 141(1):277-285.
    • (2013) Int. J. Prod. Econ. , vol.141 , Issue.1 , pp. 277-285
    • Iossifova, A.R.1    Meyer-Goldstein, S.2
  • 92
    • 4444292882 scopus 로고    scopus 로고
    • Impact of HIPAA on the integrity of healthcare information
    • Fedorowicz J., Ray A.W. Impact of HIPAA on the integrity of healthcare information. Int. J. Healthc. Technol. Manag. 2004, 6(2):142-157.
    • (2004) Int. J. Healthc. Technol. Manag. , vol.6 , Issue.2 , pp. 142-157
    • Fedorowicz, J.1    Ray, A.W.2
  • 93
    • 84865238396 scopus 로고    scopus 로고
    • Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
    • Khansa L., Cook D.F., James T., Bruyaka O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Comput. Secur. 2012, 31(6):750-770.
    • (2012) Comput. Secur. , vol.31 , Issue.6 , pp. 750-770
    • Khansa, L.1    Cook, D.F.2    James, T.3    Bruyaka, O.4
  • 94
    • 84902243096 scopus 로고    scopus 로고
    • Improving compliance with password guidelines: how user perceptions of passwords and security threats affect compliance with guidelines
    • IEEE Computer Society
    • Mwagwabi F., McGill T., Dixon M. Improving compliance with password guidelines: how user perceptions of passwords and security threats affect compliance with guidelines. 47th Hawaii International Conference on System Sciences (HICSS'14) 2014, 3188-3197. IEEE Computer Society.
    • (2014) 47th Hawaii International Conference on System Sciences (HICSS'14) , pp. 3188-3197
    • Mwagwabi, F.1    McGill, T.2    Dixon, M.3
  • 95
    • 63349110205 scopus 로고    scopus 로고
    • Security in health information systems: an exploratory comparison of U.S. and Swiss hospitals
    • IEEE Computer Society
    • Luethi M., Knolmayer G.F. Security in health information systems: an exploratory comparison of U.S. and Swiss hospitals. 42nd Hawaii International Conference on System Sciences (HICSS'09) 2009, 1-10. IEEE Computer Society.
    • (2009) 42nd Hawaii International Conference on System Sciences (HICSS'09) , pp. 1-10
    • Luethi, M.1    Knolmayer, G.F.2
  • 96
    • 84894261595 scopus 로고    scopus 로고
    • Securing business processes using security risk-oriented patterns
    • Ahmed N., Matulevičius R. Securing business processes using security risk-oriented patterns. Comput. Stand. Interfaces 2014, 36(4):723-733.
    • (2014) Comput. Stand. Interfaces , vol.36 , Issue.4 , pp. 723-733
    • Ahmed, N.1    Matulevičius, R.2
  • 98
    • 0002042413 scopus 로고
    • The 9 to 5 underground: are you policing computer crimes?
    • Hoffer J.A., Straub D.W. The 9 to 5 underground: are you policing computer crimes?. Sloan Manag. Rev. Summer 1989, 30(4):35.
    • (1989) Sloan Manag. Rev. Summer , vol.30 , Issue.4 , pp. 35
    • Hoffer, J.A.1    Straub, D.W.2
  • 99
    • 85025316026 scopus 로고    scopus 로고
    • Computer Weekly, Available from(accessed 04.02.14)
    • Kavanagh J. Security Special Report: The Internal Threat 2006, Computer Weekly, Available from http://www.computerweekly.com/feature/Security-special-report-The-internal-threat (accessed 04.02.14).
    • (2006) Security Special Report: The Internal Threat
    • Kavanagh, J.1
  • 100
    • 84930450739 scopus 로고    scopus 로고
    • A descriptive study of Microsoft's threat modeling technique
    • Scandariato R., Wuyts K., Joosen W. A descriptive study of Microsoft's threat modeling technique. Requir. Eng. 2013, 1-18.
    • (2013) Requir. Eng. , pp. 1-18
    • Scandariato, R.1    Wuyts, K.2    Joosen, W.3
  • 101
    • 84876988881 scopus 로고    scopus 로고
    • Scaling of an information system in a public healthcare market-infrastructuring from the vendor's perspective
    • Johannessen L.K., Obstfelder A., Lotherington A.T. Scaling of an information system in a public healthcare market-infrastructuring from the vendor's perspective. Int. J. Med. Inform. 2013, 82(5):e180-e188.
    • (2013) Int. J. Med. Inform. , vol.82 , Issue.5 , pp. e180-e188
    • Johannessen, L.K.1    Obstfelder, A.2    Lotherington, A.T.3
  • 102
    • 84881374070 scopus 로고    scopus 로고
    • Instant messaging at the hospital: supporting articulation work?
    • Iversen T.B., Melby L., Toussaint P. Instant messaging at the hospital: supporting articulation work?. Int. J. Med. Inform. 2013, 82(9):753-761.
    • (2013) Int. J. Med. Inform. , vol.82 , Issue.9 , pp. 753-761
    • Iversen, T.B.1    Melby, L.2    Toussaint, P.3
  • 103
    • 84886596553 scopus 로고    scopus 로고
    • Requirements engineering for security, privacy and services in cloud environments
    • Gritzalis S., Liu L. Requirements engineering for security, privacy and services in cloud environments. Requir. Eng. 2013, 18(4):297-298.
    • (2013) Requir. Eng. , vol.18 , Issue.4 , pp. 297-298
    • Gritzalis, S.1    Liu, L.2
  • 104
    • 84886639116 scopus 로고    scopus 로고
    • Evaluating cloud deployment scenarios based on security and privacy requirements
    • Kalloniatis C., Mouratidis H., Islam S. Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng. 2013, 18(4):299-319.
    • (2013) Requir. Eng. , vol.18 , Issue.4 , pp. 299-319
    • Kalloniatis, C.1    Mouratidis, H.2    Islam, S.3
  • 105
    • 84886594364 scopus 로고    scopus 로고
    • A pattern-based method for establishing a cloud-specific information security management system
    • Beckers K., CÔté I., Faßbender S., Heisel M., Hofbauer S. A pattern-based method for establishing a cloud-specific information security management system. Requir. Eng. 2013, 18(4):343-395.
    • (2013) Requir. Eng. , vol.18 , Issue.4 , pp. 343-395
    • Beckers, K.1    Côté, I.2    Faßbender, S.3    Heisel, M.4    Hofbauer, S.5
  • 106
    • 84857362250 scopus 로고    scopus 로고
    • Analysis of recommended cloud security controls to validate OpenPMF "policy as a service"
    • Lang U., Schreiner R. Analysis of recommended cloud security controls to validate OpenPMF "policy as a service". Inf. Secur. Tech. Rep. 2011, 16(3-4):131-141.
    • (2011) Inf. Secur. Tech. Rep. , vol.16 , Issue.3-4 , pp. 131-141
    • Lang, U.1    Schreiner, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.