Value conflicts for information security management

K Hedström, E Kolkowska, F Karlsson… - The Journal of Strategic …, 2011 - Elsevier
A business's information is one of its most important assets, making the protection of
information a strategic issue. In this paper, we investigate the tension between information …

Analysis of health professional security behaviors in a real clinical setting: An empirical study

JL Fernández-Alemán, A Sánchez-Henarejos… - International journal of …, 2015 - Elsevier
Objective The objective of this paper is to evaluate the security behavior of healthcare
professionals in a real clinical setting. Method Standards, guidelines and recommendations …

[HTML][HTML] Hospitals' cybersecurity culture during the COVID-19 crisis

A Georgiadou, A Michalitsi-Psarrou, F Gioulekas… - Healthcare, 2021 - mdpi.com
The coronavirus pandemic led to an unprecedented crisis affecting all aspects of the
concurrent reality. Its consequences vary from political and societal to technical and …

Dying of a hundred good symptoms: why good security can still fail-a literature review and analysis

P Loft, Y He, H Janicke, I Wagner - Enterprise Information Systems, 2021 - Taylor & Francis
Many organizations suffer serious information security incidents, despite having taken
positive steps towards achieving good security standards. The authors hypothesize that …

Culture matters: Factors affecting the adoption of telemedicine

P Mansouri-Rad, MA Mahmood… - 2013 46th Hawaii …, 2013 - ieeexplore.ieee.org
The present research investigates the influence of culture on telemedicine adoption and
patient information privacy, security, and policy. The results, based on the SEM analysis of …

Information classification issues

E Bergström, RM Åhlfeldt - Secure IT Systems: 19th Nordic Conference …, 2014 - Springer
This paper presents an extensive systematic literature review with the aim of identifying and
classifying issues in the information classification process. The classification selected uses …

Pseudonymization with metadata encryption for privacy-preserving searchable documents

J Heurix, M Karlinger… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The average costs of data leakage are steadily on the rise. As a consequence, several data
security and access control mechanisms have been introduced, ranging from data …

[PDF][PDF] Availability, accessibility, privacy and safety issues facing electronic medical records

N Innab - International Journal of Security, Privacy and Trust …, 2018 - academia.edu
Patient information recorded in electronic medical records is the most significant set of
information of the healthcare system. It assists healthcare providers to introduce high quality …

A survey of security standards applicable to health information systems

F Akowuah, X Yuan, J Xu, H Wang - International Journal of …, 2013 - igi-global.com
The information maintained by Health Information Systems (HIS) is often faced with security
threats from a wide range of sources. Some government's regulations require healthcare …

Smartphones to access to patient data in hospital settings: authentication solutions for shared devices

F Ehrler, K Blondon, D Baillon-Bigotte, C Lovis - pHealth 2017, 2017 - ebooks.iospress.nl
Although mobile devices become more and more common in clinicians' hands, transforming
them into an institutional tool to access electronic health record information at the patient's …