Development of an E-Healthcare Information Security Risk Assessment Method

被引:8
|
作者
Wei, June [1 ,2 ]
Lin, Binshan [3 ,4 ]
Loho-Noya, Meiga [1 ]
机构
[1] Univ W Florida, Coll Business, Pensacola, FL 32514 USA
[2] Univ W Florida, Dept Management & Management Informat Syst, Pensacola, FL 32514 USA
[3] Louisiana State Univ, Coll Business Adm, Dept Management Mkt, Shreveport, LA 71105 USA
[4] Louisiana State Univ, BellSouth Corp Prof, Sch Business, Shreveport, LA 71105 USA
关键词
Database; E-Healthcare; Medical Records; Pattern Analysis; Security Risk Assessment; DETERMINANTS; ADOPTION;
D O I
10.4018/jdm.2013010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security risks for eight information flows were close with a range from 55% to 86%. Third, one quantifiable approach based on a relative-weighted assessment model was developed to demonstrate how to assess the information security risks in e-healthcare. This quantitative security risk measurement establishes a reference point for assessing e-healthcare security risks and assists managers in selecting a reliable information flow infrastructure with a lower security risk level.
引用
收藏
页码:36 / 57
页数:22
相关论文
共 50 条
  • [31] E-healthcare via customized information services: Addressing the need for factually consistent information
    Abidi, SSR
    Chong, YH
    SERVICE-ORIENTED COMPUTING - ICSOC 2003, 2003, 2910 : 132 - 148
  • [32] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [33] A lightweight block cipher technique for IoT based E-healthcare system security
    Kakali Chatterjee
    Ravi Raushan Kumar Chaudhary
    Ashish Singh
    Multimedia Tools and Applications, 2022, 81 : 43551 - 43580
  • [34] Reconfigurable security solution based on hopfield neural network for e-healthcare applications
    Lakshmi, C.
    Nithya, C.
    Thenmozhi, K.
    Sivaraman, R.
    Sri, D. Yasvanthira
    Vinizia, B.
    Subashini, R.
    Meikandan, Padmapriya Velupillai
    Mahalingam, Hemalatha
    Amirtharajan, Rengarajan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [35] A lightweight block cipher technique for IoT based E-healthcare system security
    Chatterjee, Kakali
    Chaudhary, Ravi Raushan Kumar
    Singh, Ashish
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 43551 - 43580
  • [36] Formal model for e-Healthcare readiness assessment in developing country context
    Ojo, S. O.
    Olugbara, O. O.
    Ditsa, G.
    Adigun, M. O.
    Xuiu, S. S.
    2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2, 2007, : 84 - +
  • [37] E-Government Information Security Risk Assessment Research
    Lei Ping
    Lei Zhanbo
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 1, 2010, : 1 - 4
  • [38] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [39] Consumer trust - challenge for e-healthcare
    Matysiewicz, Justyna
    Smyczek, Slawomir
    FOURTH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY (COINFO 2009), 2009, : 333 - 338
  • [40] An improved reversible data hiding method in encrypted domain for E-healthcare
    Bhardwaj, Rupali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16151 - 16171