Towards a maturity model for health-care cloud security (M2HCS)

被引:12
作者
Akinsanya, Opeoluwa Ore [1 ]
Papadaki, Maria [1 ]
Sun, Lingfen [1 ]
机构
[1] Univ Plymouth, Sch Comp Elect & Math, Plymouth, Devon, England
关键词
Cybersecurity; Capability maturity model; Cloud security; Cybersecurity maturity model; Health-care cloud; Health-care maturity model;
D O I
10.1108/ICS-05-2019-0060
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security ((MHCS)-H-2), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach The intended use of the proposed model was demonstrated using the evaluation method - "construct validity test" as the paper's aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals' cyber security internal processes through web-accessible documents, and identified relevant literature. Findings The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation's capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security. Originality/value The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.
引用
收藏
页码:321 / 345
页数:25
相关论文
共 36 条
[1]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[2]  
[Anonymous], 2017, Framework for Improving Critical Infrastructure Cybersecurity Draft Version 1.1
[3]  
[Anonymous], 2007, Complete Guide to Security and Privacy Metrics: measuring Regulatory Compliance, Operational Resilience, and ROI
[4]  
Arbaugh WA, 2000, COMPUTER, V33, P52, DOI 10.1109/2.889093
[5]  
Axelrod C.W., 2008, INFORM SYSTEMS CONTR, V6
[6]   A PACS archive architecture supported on cloud services [J].
Bastiao Silva, Luis A. ;
Costa, Carlos ;
Oliveira, Jose Luis .
INTERNATIONAL JOURNAL OF COMPUTER ASSISTED RADIOLOGY AND SURGERY, 2012, 7 (03) :349-358
[7]  
Bevan N., 2006, Interactions, V13, P42, DOI 10.1145/1167948.1167976
[8]  
Bevan N., 2009, J USABILITY STUDIES
[9]   ISO 9241-11 Revised: What Have We Learnt About Usability Since 1998? [J].
Bevan, Nigel ;
Carter, James ;
Harker, Susan .
HUMAN-COMPUTER INTERACTION: DESIGN AND EVALUATION, PT I, 2015, 9169 :143-151
[10]  
Bourdon R., 2019, WAMPSERVER WINDOWS W