users as the biggest threats to security of health information systems

نویسندگان

a. bakhtiyari-shahri

z. ismail

چکیده

there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agenda of threats to his and identify issues and human factors that assist the implementation and adoption of health information security within the developing countries. in doing so, the authors try to provide a cohesive completeness identification of all threats about his and highlight the role of human in all of them. more than 70 threats to his are identified by using a large number of disparate data sources. then they are classified in 30 subjects and finally categorized in seven areas whichuser’s activities are the biggest threat at the core of risks to his.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Classification of Security Threats in Information Systems

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

متن کامل

Threats to Information Security of Real-Time Disease Surveillance Systems

This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identif...

متن کامل

Workarounds as Means to Identify Insider Threats to Information Systems Security

Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS securi...

متن کامل

Cyber threats to health information systems: A systematic review.

BACKGROUND Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. OBJECTIVE The rationale behind this systematic review is to provide a framework for future research by identifyi...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of communications and information technology

ناشر: university of sistan and baluchestan

ISSN 2322-4606

دوره 1

شماره 2 2011

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023