메뉴 건너뛰기




Volumn 24, Issue 1, 2016, Pages 1-9

Cyber threats to health information systems: A systematic review

Author keywords

cyber security; cyber terrorism; Cyber threats; cybercrime; external threats; internal threats

Indexed keywords

CINAHL; CRIME; CYBER THREAT; DATA BASE; FUTUROLOGY; HEALTH CARE INDUSTRY; HEALTH CARE SYSTEM; HUMAN; MEDICAL INFORMATION SYSTEM; MEDLINE; PRIORITY JOURNAL; REVIEW; SCIENCEDIRECT; SYSTEMATIC REVIEW; TERRORISM; THREAT; COMPUTER SECURITY; ELECTRONIC HEALTH RECORD; IDENTITY THEFT; PREVENTION AND CONTROL; STANDARDS; UNITED STATES;

EID: 84957884477     PISSN: 09287329     EISSN: None     Source Type: Journal    
DOI: 10.3233/THC-151102     Document Type: Review
Times cited : (54)

References (24)
  • 1
    • 27644565865 scopus 로고    scopus 로고
    • Can electronic medical record systems transform health care? Potential health benefits, savings, and costs
    • Hillestad R, Bigelow J, Bower A, Girosi F, Meill R, Scoville R., Taylor R. Can electronic medical record systems transform health care? Potential health benefits, savings, and costs. Health Affairs, 2005;24(5): 1103-1117.
    • (2005) Health Affairs , vol.24 , Issue.5 , pp. 1103-1117
    • Hillestad, R.1    Bigelow, J.2    Bower, A.3    Girosi, F.4    Meill, R.5    Scoville, R.6    Taylor, R.7
  • 4
    • 85020158130 scopus 로고    scopus 로고
    • Breach Notification Rule. 45 CFR 164.400-414. Washington, D.C.: [updated 2010 cited 2015 Aug 23]
    • U.S. Department of Health and Human Services [homepage on the Internet]. Breach Notification Rule. 45 CFR 164.400-414. Washington, D.C.: [updated 2010; cited 2015 Aug 23]. Available from: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule.
    • U.S. Department of Health and Human Services [Homepage on the Internet]
  • 5
    • 84859116351 scopus 로고    scopus 로고
    • Medical data breaches: Notification delayed is notification denied
    • Kierkegaard P. Medical data breaches: Notification delayed is notification denied. Computer Law and Security Review. 2012; 28(2): 163-183. Available from: doi:10.1016/j.clsr.2012.01.003
    • (2012) Computer Law and Security Review , vol.28 , Issue.2 , pp. 163-183
    • Kierkegaard, P.1
  • 6
    • 84969426278 scopus 로고    scopus 로고
    • Cybersquatting gives the Web a bad name
    • Koehler W. Cybersquatting gives the Web a bad name. Searcher. 2008; 16(8): 12.
    • (2008) Searcher , vol.16 , Issue.8 , pp. 12
    • Koehler, W.1
  • 7
    • 84921599365 scopus 로고    scopus 로고
    • A little information goes a long way: Expertise and identity theft
    • Vieraitis L, Copes H, Powell Z, Pike, A. A little information goes a long way: Expertise and identity theft. Aggression and Violent Behavior. 2015; 20. Available from: doi:10.1016/j.avb.2014.12.008.
    • (2015) Aggression and Violent Behavior , vol.20
    • Vieraitis, L.1    Copes, H.2    Powell, Z.3    Pike, A.4
  • 8
    • 85116185502 scopus 로고    scopus 로고
    • Responding to organised crime through intervention in recruitment pathways
    • Smith RG. Responding to organised crime through intervention in recruitment pathways. Trends & Issues in Crime & Criminal Justice. 2014; 473: 1-9.
    • (2014) Trends & Issues in Crime & Criminal Justice , vol.473 , pp. 1-9
    • Smith, R.G.1
  • 9
    • 84863111146 scopus 로고    scopus 로고
    • A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
    • Malekzadeh M, Ghani AA, Subramaniam S. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems. 2012; 25(7): 903-925. Available from: doi:10.1002/dac.1296.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.7 , pp. 903-925
    • Malekzadeh, M.1    Ghani, A.A.2    Subramaniam, S.3
  • 10
    • 84891429299 scopus 로고    scopus 로고
    • Cyberterrorism: Is the U.S Healthcare System Safe?
    • Harries D, Yellowlees P. Cyberterrorism: Is the U.S. Healthcare System Safe? Telemedicine and E-Health. 2013; 19(1): 61-66. doi:10.1089/tmj.2012.0022.
    • (2013) Telemedicine and E-Health , vol.19 , Issue.1 , pp. 61-66
    • Harries, D.1    Yellowlees, P.2
  • 11
    • 84897107428 scopus 로고    scopus 로고
    • Detecting inappropriate access to electronic health records using collaborative filtering
    • Menon A, Jiang X, Kim J, Vaidya J, Ohno-Machado L. Detecting inappropriate access to electronic health records using collaborative filtering. Mach Learn. 2013; 95(1): 87-101. Available from: doi:10.1007/s10994-013-5376-1.
    • (2013) Mach Learn , vol.95 , Issue.1 , pp. 87-101
    • Menon, A.1    Jiang, X.2    Kim, J.3    Vaidya, J.4    Ohno-Machado, L.5
  • 14
    • 84871879163 scopus 로고    scopus 로고
    • Security practices and regulatory compliance in the healthcare industry
    • Kwon J, & Johnson ME. (2013). Security practices and regulatory compliance in the healthcare industry. Journal of the American Medical Informatics Association. 2013; 20(1): 44-51. Available from: doi:10.1136/amiajnl-2012-000906.
    • (2013) Journal of the American Medical Informatics Association 2013 , vol.20 , Issue.1 , pp. 44-51
    • Kwon, J.1    Johnson, M.E.2
  • 15
    • 57649095360 scopus 로고    scopus 로고
    • A trusting environment, everyone is responsible for information security
    • Williams PA. In a trusting environment, everyone is responsible for information security. Information Security Technical Report. 2008; 13(4): 207-215. Available from: doi:10.1016/j.istr.2008.10.009.
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 207-215
    • Williams, P.A.1
  • 16
    • 84892369906 scopus 로고    scopus 로고
    • A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes
    • Bai X, Gopal R, Nunez M, Zhdanov D. A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes. Decision Support Systems. 2014; 57: 406-416. Available from: doi:10.1016/j.dss.2012.10.046.
    • (2014) Decision Support Systems , vol.57 , pp. 406-416
    • Bai, X.1    Gopal, R.2    Nunez, M.3    Zhdanov, D.4
  • 17
    • 77951135204 scopus 로고    scopus 로고
    • The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
    • Bansal G, Zahedi F, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems. 2014; 49: 138-150. Available from: doi:10.1016/j.dss.2010.01.010.
    • (2014) Decision Support Systems , vol.49 , pp. 138-150
    • Bansal, G.1    Zahedi, F.2    Gefen, D.3
  • 18
    • 84865238396 scopus 로고    scopus 로고
    • Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
    • Khansa L, Cook DF, James T, Bruyaka O. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. Computers & Security. 2012; 31: 750-770. Available from: doi:10.1016/j.cose.2012.06.007.
    • (2012) Computers & Security , vol.31 , pp. 750-770
    • Khansa, L.1    Cook, D.F.2    James, T.3    Bruyaka, O.4
  • 19
    • 78649636201 scopus 로고    scopus 로고
    • The economics of cybersecurity: Principles and policy options
    • Moore, T. The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection. 2010; 3: 103-117. Available from: doi:10.1016/j.ijcip.2010.10.002.
    • (2010) International Journal of Critical Infrastructure Protection , vol.3 , pp. 103-117
    • Moore, T.1
  • 20
    • 77956563657 scopus 로고    scopus 로고
    • Feature: Healthcare biometrics-defending patients and their data
    • Gold S. Feature: Healthcare biometrics-defending patients and their data. Biometric Technology Today. 2010; (7): 109-11. Available from: doi:10.1016/S0969-4765(10)70145-4.
    • (2010) Biometric Technology Today , vol.7 , pp. 109-111
    • Gold, S.1
  • 22
    • 84904892576 scopus 로고    scopus 로고
    • [updated 2014, cited 2015 Aug 20] SANS Institute
    • SANS Institute. Health Care Cyberthreat Report 2014:2-41. [updated 2014, cited 2015 Aug 20]. Available from http://pages.norse-corp.com/rs/norse/images/Norse-SANS-Healthcare-Cyberthreat-Report2014.pdf.
    • (2014) Health Care Cyberthreat Report , pp. 2-41
  • 24
    • 84957902709 scopus 로고    scopus 로고
    • [cited 2015 Aug 20] EMC
    • EMC, 2013. Cybercrime and the Healthcare Industry. [cited 2015 Aug 20]. Available from: http://www.emc.com/colla teral/white-papers/h12105-cybercrime-healthcare-industry-rsa-wp.pdf.
    • (2013) Cybercrime and the Healthcare Industry


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.