An Overview on Information Security Threats In Healthcare Systems


Received: 12 Apr 2022
Revised: 21 May 2022
Accepted: 17 Jun 2022

Behrouz Vasfi Varzande, Shahram Nasiri

  Download Full Text

https://dx.doi.org/10.22034/JPMIS.2022.23052206

  XML Files


Abstract

Nowadays Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researches focused only to certain factors which involved extremely (e.g., virus attack). Security and privacy of patients information are concerns of all healthcare organizations. Because threats can effect on patients directly or indirectly. In This paper reviewed all metrics of threats of information security systems as internal and external threats. We also studied on probably critical threats to modern information security systems in scope healthcare systems. The papers purpose is identifying total possible risks for designer to have a secure system.

Keywords: Threat, Healthcare System, Information security.


  Download Full Text

 

References

 

[1] Gerd Stefan Brost, Mario Hoffmann. (2015). Identifying Security Requirements and Privacy Concerns in Digital Health Applications. Requirements Engineering for Digital Health.

[2] Xue Bai , Ram Gopal , Manuel Nunez , Dmitry Zhdanov. (2014). A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes. Decision Support Systems, 57.

[3] Tobias Dehling, Ali Sunyaev. (2014). Information Security and Privacy of Patient-Centered Health IT Services: What needs to be done? Paper presented at the 47th Hawaii International Conference on System Science

[4] Jose Pagliery. (2014). Hospital network hacked, 4.5 million records stolen, CNN PRESS. Retrieved from http://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/

[5] Harsh Kupwade Patil, Ravi Seshadri. (2014). Big data security and privacy issues in healthcare. Paper presented at the Big Data (BigData Congress). http://nanthealth.com/wp-content/uploads/2014/06/PID6795-Big-data-security-and-privacy-issues-in-healthcare.pdf

[6] Poonam Barua, Sanjeev Indora. (2013). Overview of Security Threats in WSN International Journal of Computer Science and Mobile Computing, 2(7).

[7] José Luis Fernandez-Alemán, Inmaculada Carrión Señor, Pedro Ángel Oliver Lozoya, Ambrosio Toval. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46.

[8] Arunabha Mukhopadhyay , Samir Chatterjee , Debashis Saha , Ambuj Mahanti ,  Samir K. Sadhukhan. (2013). Cyber-risk decision models: To insure IT or not? Decision Support Systems.

[9] Pardeep Kumar, Hoon-Jae Lee. (2012). Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. MDPI - Open Access Publishing, 12.

[10] Moshaddique Al Ameen, Jingwei Liu, Kyungsup Kwak. (2012). Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications. Journal of Medical Systems.

[11] Mohd. Nabil Almunawar , Muhammad Anshari. (2012). Health Information Systems (HIS): Concept and Technology. Cornell University library.

[12] Guide for Conducting Risk Assessments. (2012). NIST Special Publication 800-30 Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf.

[13] J. Harold Pardue , Priya Patidar. (2011). THREATS TO HEALTHCARE DATA: A THREAT TREE FOR RISK ASSESSMENT. Paper presented at the International Association for Computer Information Systems.

[14] Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan OShea. (2010). Security Metrics for e-Healthcare Information Systems: A Domain Specific Metrics Approach. International Journal of Digital Society, 1(4).

[15] Abhishek Pandey , R.C. Tripathi. (2010). A Survey on Wireless Sensor Networks Security. International Journal of Computer Applications, 3(2).

[16] Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail. (2009). Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. Paper presented at the Fifth International Conference on Information Assurance and Security.

[17] Mary Sumner (2009). Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness 26(1).

[18] KAREN A. WAGER, FRANCES WICKHAM LEE, JOHN P. GLASER (2009). HEALTH CARE INFORMATION SYSTEMS (2 Ed.): Jossey-Bass.

[19] Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail. (2009). Threats to Health Information Security. Paper presented at the Fifth International Conference on Information Assurance and Security.

[20] David Boyle , Thomas Newe. (2008). Securing Wireless Sensor Networks: Security Architectures. JOURNAL OF NETWORKS, 3(1).

[21] Ajit Appari , M. Eric Johnson. (2008). Information Security and Privacy in Healthcare: Current State of Research. International Journal of Internet and Enterprise Management.

[22] Alexander Berler, Stergiani Spyrou, Evaggelos Monochristou, Yannis A. Tolias, George Konnis, Nikolaos Magglaveras, ;, Dimitris Koutsouris. (2007). Risk Assessment in Integrated Regional Healthcare Networks. http://www.researchgate.net/profile/Alexander_Berler/publication/228745205_Risk_Assessment_in_Integrate d_Regional_Healthcare_Networks/links/0912f50fef8a759f75000000.pdf

[23] HIPAA security series , Basics of Risk Analysis and Risk Management (2007). U.S. Department of Health Human Services Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/riskassessment.pdf.

[24] Michael E. Whitman. (2003). Enemy at the Gate: Threats to Information SecurityFaculty Publication 46(8).

[25] Gary B. Shelly, Thomas J. Cashman, Misty E. Vermaat. (2000). Discovering Computers 2001 Concepts for a Connected World Course Technology.

 

 

 

 


555
Related Content

Rosepub - Journal management system