Development of an E-Healthcare Information Security Risk Assessment Method

被引:8
作者
Wei, June [1 ,2 ]
Lin, Binshan [3 ,4 ]
Loho-Noya, Meiga [1 ]
机构
[1] Univ W Florida, Coll Business, Pensacola, FL 32514 USA
[2] Univ W Florida, Dept Management & Management Informat Syst, Pensacola, FL 32514 USA
[3] Louisiana State Univ, Coll Business Adm, Dept Management Mkt, Shreveport, LA 71105 USA
[4] Louisiana State Univ, BellSouth Corp Prof, Sch Business, Shreveport, LA 71105 USA
关键词
Database; E-Healthcare; Medical Records; Pattern Analysis; Security Risk Assessment; DETERMINANTS; ADOPTION;
D O I
10.4018/jdm.2013010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security risks for eight information flows were close with a range from 55% to 86%. Third, one quantifiable approach based on a relative-weighted assessment model was developed to demonstrate how to assess the information security risks in e-healthcare. This quantitative security risk measurement establishes a reference point for assessing e-healthcare security risks and assists managers in selecting a reliable information flow infrastructure with a lower security risk level.
引用
收藏
页码:36 / 57
页数:22
相关论文
共 50 条
[41]   Hiding patient information in medical images: an enhanced dual image separable reversible data hiding algorithm for E-healthcare [J].
Rupali Bhardwaj .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 :321-337
[42]   Hiding patient information in medical images: an enhanced dual image separable reversible data hiding algorithm for E-healthcare [J].
Bhardwaj, Rupali .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (1) :321-337
[43]   Sensory substitution for Internet-based E-healthcare robotic system [J].
Liu, Polley R. ;
Meng, Max Q. -H. .
2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, :31-36
[44]   Changes in Stress Mindset and EEG through E-Healthcare Based Education [J].
Park, Hyungwoo ;
Hahm, Sangwoo .
IEEE ACCESS, 2019, 7 :20163-20171
[45]   Blockchain Factors in the Design of Smart-Media for E-Healthcare Management [J].
Shah, Dhaneshwar ;
Rani, Sunanda ;
Shoukat, Khadija ;
Kalsoom, Habiba ;
Shoukat, Muhammad Usman ;
Almujibah, Hamad ;
Liao, Shengxiao .
SENSORS, 2024, 24 (21)
[46]   A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems [J].
Tahir, Adnan ;
Chen, Fei ;
Khan, Habib Ullah ;
Min, Zhong ;
Ahmad, Arshad ;
Nazir, Shah ;
Shafiq, Muhammad .
SENSORS, 2020, 20 (18) :1-32
[47]   Blockchain Based Smart Contracts for Internet of Medical Things in e-Healthcare [J].
Sharma, Ashutosh ;
Sarishma ;
Tomar, Ravi ;
Chilamkurti, Naveen ;
Kim, Byung-Gyu .
ELECTRONICS, 2020, 9 (10) :1-14
[48]   the Discussion of Information System Security Risk Assessment Course Teaching [J].
Pan Ping ;
Yang Ping .
NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, :139-142
[49]   HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT [J].
Sajko, Mario ;
Rabuzin, Kornelije ;
Baca, Miroslav .
JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2006, 30 (02) :263-278
[50]   SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems [J].
Masmoudi, Souha ;
Kaaniche, Nesrine ;
Laurent, Maryline .
IEEE ACCESS, 2022, 10 :106400-106414