Guidelines for designing it security management tools

P Jaferian, D Botta, F Raja, K Hawkey… - Proceedings of the 2nd …, 2008 - dl.acm.org
An important factor that impacts the effectiveness of security systems within an organization
is the usability of security management tools. In this paper, we present a survey of design …

[图书][B] Integrated security systems design: A complete reference for building enterprise-wide digital security systems

TL Norman - 2014 - books.google.com
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book
on the subject of security systems design. It explains how to design a fully integrated security …

[PDF][PDF] Draft security architecture design process for health information exchanges (HIEs)

M Scholl, K Stine, K Lin, D Steinberg - Report, NIST, 2009 - gocs.com.de
Protecting electronic patient health information is crucial to the deployment of a Health
Information Exchange (HIE). As noted in the Summary of the National Health Information …

Responding to Security Incidents--Sooner or Later Your Systems Will Be Compromised.

S Wilcox, B Brown - Journal of Health Care Compliance, 2005 - search.ebscohost.com
Deals with security standards for the federal Health Insurance Portability and Accountability
Act that established administrative procedures to guard data integrity, confidentiality and …

A holistic approach to cybersecurity starts at the top

SP Murphy - Frontiers of Health Services Management, 2018 - journals.lww.com
Over the past several years, healthcare organizations have become highly valued targets for
enemy nation states, organized criminals, and even “hacktivists” who want to draw attention …

Human, organizational, and technological factors of IT security

K Hawkey, D Botta, R Werlinger, K Muldner… - CHI'08 extended …, 2008 - dl.acm.org
This paper describes the HOT Admin research project, which is investigating the human,
organizational, and technological factors of IT security from the perspective of security …

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

O Santos, S Salam, H Dahir - 2024 - books.google.com
The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity,
and More. AI is having a profound impact on nearly every sector of the workforce. Huge …

Security and resilience in eHealth infrastructures and services

D Liveri, A Sarri, C Skouloudi - Security Challenges and Risks, 2015 - eiseverywhere.com
Security and resilience for eHealth Infrastructures and Service Page 1 European Union Agency
For Network And Information Security Security and resilience for eHealth Infrastructures and …

Information security foundations for the interoperability of electronic health records

W Arthur Conklin, A McLeod - International Journal of …, 2010 - inderscienceonline.com
Electronic Health Records (EHRs) are clearly in the future of medicine and will provide
benefits to all parties. Accurate and timely health record information is essential and …

Security Audit Center--a suggested model for effective audit strategies in health care informatics.

A Hayam - International Journal of Bio-Medical Computing, 1994 - europepmc.org
As dependence upon interorganizational and international health care informatics becomes
absolute, and with increased vulnerability of information networks and applications and the …