2015
DOI: 10.1016/j.ijmedinf.2015.08.010
|View full text |Cite
|
Sign up to set email alerts
|

Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 25 publications
2
28
0
Order By: Relevance
“…This should not be a challenge. This has been confirmed in the previous case studies [27,32,54,55]. If the organizations did not apply any security standards/guidelines, security requirements have to be retrieved from the case descriptive materials.…”
Section: Success Criteriasupporting
confidence: 62%
See 1 more Smart Citation
“…This should not be a challenge. This has been confirmed in the previous case studies [27,32,54,55]. If the organizations did not apply any security standards/guidelines, security requirements have to be retrieved from the case descriptive materials.…”
Section: Success Criteriasupporting
confidence: 62%
“…The data sources of case studies can be diversified such as the official security incident reports used in the analysis of the VA incidents [1,2], and the money penalty report used in the analysis of IT asset disposing incident [25]. Existing work suggests that the GST can be used to structure the security lessons identified from various data sources [27,32,54,55], However, the following requirements have to be met in order to be successful. Security requirements can be captured based on the existing security standards applied by the organization.…”
Section: Success Criteriamentioning
confidence: 99%
“…According to Williams (Williams, 2015) one of the last remaining hurdles to be overcome in the design of safe, reliable systems is the human being as recognised by safety and reliability engineers. Lacey (Lacey, 2010) suggests that Security Managers could benefit from studying the lessons learned in the safety field and He and Johnson (He and Johnson, 2015) presented in their research that the reoccurrence of past security incidents in healthcare showed that lessons had not been learned across healthcare organisations. With regard to risk analysis performed within IT security and the safety field the only main difference is the terminology so it is suggested that IT security is treated the same as systematic failures in the safety field (Braband and Schäbe, 2016).…”
Section: Related Workmentioning
confidence: 99%
“…The healthcare sector continues to be affected by the largest percentage of data breaches (He and Johnson, 2015) with almost two breaches per day being recorded in 2015, which is ten times the volume reported in 2009 presenting a position whereby preventing healthcare breaches is very difficult (McLeod and Dolezel, 2018). The reporting of incidents is core requirement for UK National Health Service (NHS) organisations (Rooksby, Gerry and Smith, 2007).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, a virtual environment for testing is required. There is existing work demonstrating cyber-attacks towards healthcare system and proposing cyber security strategies to defend against such attacks [11][12][13][14][15], however, it is not against a realistic healthcare system.…”
Section: Introductionmentioning
confidence: 99%