An Overview on Information Security Threats In Healthcare Systems

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 955

فایل این مقاله در 9 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICTMNGT01_021

تاریخ نمایه سازی: 19 تیر 1394

چکیده مقاله:

Nowadays Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researches focused only to certain factors which involved extremely (e.g., virus attack). Security and privacy of patients’ information are concerns of all healthcare organizations. Because threats can effect on patients directly or indirectly. In This paper reviewed all metrics of threats of information security systems as internal and external threats. We also studied on probably critical threats to modern information security systems in scope healthcare systems. The paper’s purpose is identifying total possible risks for designer tohave a secure system.

کلیدواژه ها:

نویسندگان

Behrouz Vasfi Varzande

Student of software engineer in B.S.

Shahram Nasiri

Member of scientific board of Sirjan University of Technology

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Gerd Stefan Brost, & Mario Hoffmann. (2015). Identifying Security Requirements ...
  • Xue Bai , Ram Gopal , Manuel Nunez , Dmitry ...
  • Harsh Kupwade Patil, _ Ravi Seshadri. (2014). Big _ security ...
  • Poonam Barua, _ Sanjeev Indora. (2013). Overview of Security Threats ...
  • Arunabha Mukhopadhyay _ Samir Chatterjee _ Debashis Saha , Ambuj ...
  • Pardeep Kumar, Hoon-Jae Lee. (2012). Security Issues in Healthcare Applications ...
  • Moshaddique Al Ameen, Jingwei Liu, & Kyungsup Kwak. (2012). Security ...
  • Mohd. Nabil Almunawar , Muhammad Anshari. (2012. Health Information Systems ...
  • Guide for Conducting Risk Assessments. (2012). NIST Special Publication 800-30 ...
  • J. Harold Pardue , & Priya Patidar. (2011). THREATS TO ...
  • Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea. (2010). Security ...
  • Abhishek Pandey , R.C. Tripathi. (2010). A Survey on Wireless ...
  • Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. ...
  • Mary Sumner (2009. Information Security Threats: A Comparative Analysis of ...
  • KAREN A. WAGER, FRANCES WICKHAM LEE, 8& JOHN P. GLASER ...
  • Ganthan Narayana Samy, Rabiah Ahmad, 8 Zuraini Ismail. (2009). Threats ...
  • David Boyle , Thomas Newe. (2008). Securing Wireless Sensor Networks: ...
  • Ajit Appari , & M. Eric Johnson. (2008). Information Security ...
  • Alexander Berler, Stergiani Spyrou, Evaggelos Monochristou, Yannis A. Tolias, George ...
  • HIPAA security series , Basics of Risk Anolysis and Risk ...
  • http://www.h _ ov/ocr/p rivacv/hipaa/ad _ i nistrative/secl ityru le/ris kassess ...
  • Gary B. Shelly, Thomas J. Cashman, _ Misty E. Vermaat. ...
  • نمایش کامل مراجع