Estimating Security Risk of Healthcare Web Applications: A Design Perspective

被引:2
作者
Alzahrani, Fahad A. [1 ]
机构
[1] Umm Al Qura Univ, Dept Comp Engn, Mecca 24381, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 67卷 / 01期
关键词
Web based hospital management system; security risk; fuzzy AHP; fuzzy TOPSIS; TOPSIS; AHP; CYBERSECURITY; DURABILITY; THREATS;
D O I
10.32604/cmc.2021.014007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent years, the booming web-based applications have attracted the hackers' community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user's confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients' medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field of the medical industry as a whole. The objective of this study is to estimate the security risk assessment of WBHMS. The risks assessment pertains to securing the integrity of the information in alignment with the Health Insurance Portability and Accountability Act. This includes protecting the relevant financial records, as well as the identification, evaluation, and prevention of a data breach. In the past few years, according to the US-based cyber-security firm Fire-eye, 6.8 million data thefts have been recorded in the healthcare sector in India. The breach barometer report mentions that in the year 2019, the data breaches found were up to 48.6% as compared to the year 2018. Therefore, it is very important to assess the security risk in WBHMS. In this research, we have followed the hybrid technique fuzzy analytic hierarchy process-technique for order of preference by similarity to ideal solution (F-AHPTOPSIS) approach to assess the security risk in WBHMS. The place of this empirical database is at the local hospital of Varanasi, U.P., India. Given the affectability of WBHMS for its board framework, this work has used diverse types of web applications. The outcomes obtained and the procedure used in this assessment would support future researchers and specialists in organizing web applications through advanced support of safety and security.
引用
收藏
页码:187 / 209
页数:23
相关论文
共 63 条
[1]  
Agrawal Alka, 2019, ICIC Express Letters, Part B: Applications, V10, P665, DOI 10.24507/icicelb.10.08.665
[2]  
Agrawal A., 2020, IEEE ACCESS, V8, P135770
[3]   Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS [J].
Agrawal, Alka ;
Alenezi, Mamdouh ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2019, 7 :153936-153951
[4]   Security durability assessment through fuzzy analytic hierarchy process [J].
Agrawal, Alka ;
Zarour, Mohammad ;
Alenezi, Mamdouh ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
PEERJ COMPUTER SCIENCE, 2019, 2019 (09)
[5]  
Agrawal A, 2022, J KING SAUD UNIV-COM, V34, P657, DOI 10.1016/j.jksuci.2019.04.007
[6]   CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers [J].
Akinrolabu, Olusola ;
New, Steve ;
Martin, Andrew .
COMPUTERS, 2019, 8 (03)
[7]  
Alenezi Mamdouh, 2019, ICIC Express Letters, V13, P453, DOI 10.24507/icicel.13.06.453
[8]  
Alenezi M., 2020, INT J INTELLIGENT EN, V13, P181
[9]   Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective [J].
Alenezi, Mamdouh ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2020, 8 :25543-25556
[10]   Websites Input Validation and Input Misuse Based Attacks [J].
Alsmadi, Izzat ;
Alazzam, Iyad .
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, :113-116