Development of an E-Healthcare Information Security Risk Assessment Method

被引:8
作者
Wei, June [1 ,2 ]
Lin, Binshan [3 ,4 ]
Loho-Noya, Meiga [1 ]
机构
[1] Univ W Florida, Coll Business, Pensacola, FL 32514 USA
[2] Univ W Florida, Dept Management & Management Informat Syst, Pensacola, FL 32514 USA
[3] Louisiana State Univ, Coll Business Adm, Dept Management Mkt, Shreveport, LA 71105 USA
[4] Louisiana State Univ, BellSouth Corp Prof, Sch Business, Shreveport, LA 71105 USA
关键词
Database; E-Healthcare; Medical Records; Pattern Analysis; Security Risk Assessment; DETERMINANTS; ADOPTION;
D O I
10.4018/jdm.2013010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security risks for eight information flows were close with a range from 55% to 86%. Third, one quantifiable approach based on a relative-weighted assessment model was developed to demonstrate how to assess the information security risks in e-healthcare. This quantitative security risk measurement establishes a reference point for assessing e-healthcare security risks and assists managers in selecting a reliable information flow infrastructure with a lower security risk level.
引用
收藏
页码:36 / 57
页数:22
相关论文
共 50 条
[31]   An embedding technique for smartcard-supported e-healthcare services [J].
A. H. M. Kamal ;
Mohammad Mahfuzul Islam ;
Zehadul Islam .
Iran Journal of Computer Science, 2020, 3 (4) :195-205
[32]   Internet of Things and Machine Learning Convergence: The E-healthcare Revolution [J].
Zaouiat, C. E. Ait ;
Latif, A. .
ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,
[33]   The Characteristics of the use of Twitter by Beginners Study of the applicability to the e-healthcare [J].
Oda, Masaomi .
2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, :1268-1273
[34]   BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications [J].
Wazid, Mohammad ;
Gope, Prosanta .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2023, 23 (03)
[35]   LiSRA: Lightweight Security Risk Assessment for decision support in information security [J].
Schmitz, Christopher ;
Pape, Sebastian .
COMPUTERS & SECURITY, 2020, 90
[36]   Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions [J].
Sahi, Muneeb Ahmed ;
Abbas, Haider ;
Saleem, Kashif ;
Yang, Xiaodong ;
Derhab, Abdelouahid ;
Orgun, Mehmet A. ;
Iqbal, Waseen ;
Rashid, Imran ;
Yaseen, Asif .
IEEE ACCESS, 2018, 6 :464-478
[37]   Data Mining Facilitates e-Patients through e-Healthcare: An Empirical Study [J].
Rahaman, Sophia ;
Biju, Seena .
2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, :1158-1165
[38]   Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems [J].
Zhang, Mingwu re ;
Chen, Yu ;
Susilo, Willy .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) :3988-4001
[39]   E-Healthcare in India: Critical Success Factors for Sustainable Health Systems [J].
Taneja, Udita ;
Sushil .
MEDINFO 2007: PROCEEDINGS OF THE 12TH WORLD CONGRESS ON HEALTH (MEDICAL) INFORMATICS, PTS 1 AND 2: BUILDING SUSTAINABLE HEALTH SYSTEMS, 2007, 129 :257-+
[40]   Kernel Regression Based Encrypted Images Compression for E-healthcare Systems [J].
Song, Chunhe ;
Lin, Xiaodong ;
Shen, Xuemin ;
Luo, Henry .
2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013), 2013,