Towards a practical healthcare information security model for healthcare institutions

A Dwivedi, RK Bali, MA Belsis… - … IEEE EMBS Special …, 2003 - ieeexplore.ieee.org
In recent years, a number of countries have introduced plans for national electronic patient
record (EPR) systems. This paper argues that, in the near future, both patients and …

[HTML][HTML] “Safeware”: safety-critical computing and health care information technology

RL Wears, NG Leveson - 2011 - europepmc.org
Information technology (IT) is highly promoted as a mechanism for advancing safety in
health care. Ironically, little attention has been paid to the issues of safety in health care IT …

A sustainable approach to security and privacy in health information systems

V Liu, L May, W Caelli, P Croll - Proceedings of the 18th …, 2007 - eprints.qut.edu.au
This paper identifies and discusses recent information privacy violations or weaknesses
which have been found in national infrastructure systems in Australia, the United Kingdom …

Integrated cybersecurity methodology and supporting tools for healthcare operational information systems

B Coutinho, J Ferreira, I Yevseyeva… - Computers & …, 2023 - Elsevier
The recent increase in cybersecurity threats and cyberattacks impact organizations at
various levels, including business-critical processes, and compromises business …

[PDF][PDF] Security and privacy for Mobile healthcare (m-health) systems

J Sun, X Zhu, C Zhang, Y Fang - Handbook on securing cyber …, 2011 - fang.ece.ufl.edu
Fast and secure access to patients' records helps to save lives with timely treatment in
emergency situations. Therefore, anywhere-anytimeaccessible online health-care or …

Security in healthcare information systems

ZO Omogbadegun - 2006 ITI 4th International Conference on …, 2006 - ieeexplore.ieee.org
Healthcare informatics affirm that healthcare presents most problems of user control with
disparate, individualized and often vulnerable users having little information with which to …

A system‐aware cyber security architecture

RA Jones, B Horowitz - Systems Engineering, 2012 - Wiley Online Library
As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the
capabilities to embed infections in equipment that is employed in nuclear power systems. In …

Generic security cases for information system security in healthcare systems

Y He, CW Johnson - … on System Safety, incorporating the Cyber …, 2012 - ieeexplore.ieee.org
Numerous data breach incidents have been reported in recent years and there is a
continuing requirement to protect patient and clinician confidentiality. However, the diversity …

Improving the automation of security information management: A collaborative approach

I Aguirre, S Alonso - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
Many preventive security measures purport to protect networks from cyber intrusions. These
adopted measures can generate a large amount of information that should be stored and …

Implementation of security policy for clinical information systems over wireless sensor networks

J Mišić, VB Mišić - Ad Hoc Networks, 2007 - Elsevier
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and
patient monitoring in general, would greatly benefit from light, autonomous devices which …