2013
DOI: 10.4018/ijisp.2013100103
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security Standards Applicable to Health Information Systems

Abstract: The information maintained by Health Information Systems (HIS) is often faced with security threats from a wide range of sources. Some government's regulations require healthcare organizations and custodians of personal health information to take practical steps to address the security and privacy needs of personal health information. Standards help to ensure an adequate level of security is attained, resources are used efficiently and the best security practices are adopted. In this paper, the authors survey … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Along the same lines – although it is a well-documented fact that a successful management system requires leadership endorsement (e.g. Crowder, 2013) – several articles indicate that ISO/IEC 27001 is mostly developed by IT departments alone (Van Wessel et al , 2011; Akowuah et al , 2013). Stewart (2018) notes that information security leaders are unlikely to be included in the management committee.…”
Section: Thematic Findingsmentioning
confidence: 99%
“…Along the same lines – although it is a well-documented fact that a successful management system requires leadership endorsement (e.g. Crowder, 2013) – several articles indicate that ISO/IEC 27001 is mostly developed by IT departments alone (Van Wessel et al , 2011; Akowuah et al , 2013). Stewart (2018) notes that information security leaders are unlikely to be included in the management committee.…”
Section: Thematic Findingsmentioning
confidence: 99%
“…The Control Objectives for Information and Related Technology (COBIT) framework was created by the Information Systems Audit and Control Association (ISACA) for IT management and governance. It allows technical managers to bridge the gap between control requirements, technical issues, and business risks (Akowuah et al, 2013). The COBIT 2019 framework provides for integration with NIST's Cybersecurity Framework to comprehensively address IT governance in the rapidly evolving cybersecurity landscape.…”
Section: Applying Security Standards Using the Frameworkmentioning
confidence: 99%
“…Scholarshavestudiedpasswordauthenticationfromdiverseperspectives.Forexample,In1980s, anidentityauthenticationsolutionbasedonapasswordlistforaccessofremoteuserswaspresented (Akowuah, Yuan, Xu, & Wang, 2013). Purdy (1974) proposes to use a one-way function Y=f(x) transformationforacquiringthecorrespondingrelationbetweenapasswordandanexplicittext.…”
Section: Password Authenticationmentioning
confidence: 99%