2018
DOI: 10.1007/978-3-319-77028-4_97
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality, Integrity and Availability in Electronic Health Records: An Integrative Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The Confidentiality, Integrity and Availability (CIA) triad model is used in a variety of information systems, such as health information (Azadi et al, 2018). The model is helpful for evaluating factors related to choosing vendors and this can be considered an important component of the proposed ISA framework.…”
Section: Discussionmentioning
confidence: 99%
“…The Confidentiality, Integrity and Availability (CIA) triad model is used in a variety of information systems, such as health information (Azadi et al, 2018). The model is helpful for evaluating factors related to choosing vendors and this can be considered an important component of the proposed ISA framework.…”
Section: Discussionmentioning
confidence: 99%
“…of success of attack, where signifies that the attack is successfully blocked, and when it is invalid [20,40] .…”
Section: State Transitionsmentioning
confidence: 99%
“…In CPS cybersecurity, the attacker and defender strategies are crucial in determining the outcome of a security situation. Tables 2 and 3 provide a detailed description of the various attacker and strategies respectively [40,48] .…”
Section: Data Summarymentioning
confidence: 99%