2012
DOI: 10.2196/ijmr.2137
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and Comparing Information Security in Swiss Hospitals

Abstract: BackgroundAvailability of information in hospitals is an important prerequisite for good service. Significant resources have been invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed.ObjectiveThe goal of this study was to assess information security in hospitals through a questionnaire based on the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002, evalu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…by verifying how hospitals comply with the ISO/IEC 27002 standard; however, the results also indicate that the audited hospitals have a low level of security. Another recently published work by Jalali and Kaiser [19], who studied cyber security in hospitals using a series of interviews, shows that one of the reasons is the end point complexity of the systems applied. This might be the case in Poland where numerous different applications are used, making it more difficult to create training programs for medical professionals that will cover all possible scenarios.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…by verifying how hospitals comply with the ISO/IEC 27002 standard; however, the results also indicate that the audited hospitals have a low level of security. Another recently published work by Jalali and Kaiser [19], who studied cyber security in hospitals using a series of interviews, shows that one of the reasons is the end point complexity of the systems applied. This might be the case in Poland where numerous different applications are used, making it more difficult to create training programs for medical professionals that will cover all possible scenarios.…”
Section: Discussionmentioning
confidence: 99%
“…Their analysis shows that efforts to homogenise resource availability across hospitals reduce the probability of a cyberattack. In Europe, Landolt et al [19] evaluated the current status of information security in Swiss hospitals. The results showed very low scores, particularly for basic security issues.…”
Section: Healthcare Data Securitymentioning
confidence: 99%
“…However, that does not mean IS in HSCs also has to lag behind, because healthcare involves highly personal information. Depending on the seriousness of the breach, it could mean the end of a healthcare assistance organization (Hedström et al, 2011;Landolt et al, 2012;Huang et al, 2014).…”
Section: Proposition 4 -Specific Investments Are Made To Properly Promentioning
confidence: 99%
“…IT has an increasingly important role in the field of healthcare assistance, due to the need to provide information in a timely manner for decision-making, as well as protect patient information. However, whatever of the cost of ensure information security, the cost of failing to protect patient information may be more expensive (Landolt et al, 2012;Samy et al, 2010). Healthcare professionals often require rapid access to patient information, and the delivery of that information may not always be in compliance with organizational and industry Information Security standards (Hedström et al, 2011;Huang et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Information and data in HIS has different values and may be subject to different regulations. In this context, knowing the value, sensitivity, and importance of hospital data allows for prioritizing the protection measures (Landolt et al, 2012). Further, there are an increasing number of internal and external systems exchange data with each other over the Internet, and the data are subject to data protection law and have to protect.…”
Section: Data Security Issuesmentioning
confidence: 99%