2009
DOI: 10.1007/978-3-540-89208-3_232
|View full text |Cite
|
Sign up to set email alerts
|

The Degree of Privacy in Web-based Electronic Health Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Same integrity obtained 2nd highest weight (0.3296) for level 1 and sub-factor of integrity, network security also obtained the second highest weights (0.1267), so we assigned the 2nd rank, control accessibility based on weight (0.1250) obtained 3rd rank, maintain efficiency obtains 4th rank based on weight (0.1174), paper security obtain 5th rank based on obtained weight (0.0855), eavesdropping obtain 6th rank based on weight (0.0823), encryption obtain 7th rank based on weight (0.0749), password changing remainder obtain8th rank based on weight (0.0685), Man in middle attacks and malware/phishing obtain 9th and 10th rank based on weight (0.0500) (0.0677), respectively. The authors have evaluated the performance of factors for securing the HIS with the help 4)- (9). By using the equation ( 15), we calculated the normalized weights of the matrix.…”
Section: Results and Outcomementioning
confidence: 99%
See 1 more Smart Citation
“…Same integrity obtained 2nd highest weight (0.3296) for level 1 and sub-factor of integrity, network security also obtained the second highest weights (0.1267), so we assigned the 2nd rank, control accessibility based on weight (0.1250) obtained 3rd rank, maintain efficiency obtains 4th rank based on weight (0.1174), paper security obtain 5th rank based on obtained weight (0.0855), eavesdropping obtain 6th rank based on weight (0.0823), encryption obtain 7th rank based on weight (0.0749), password changing remainder obtain8th rank based on weight (0.0685), Man in middle attacks and malware/phishing obtain 9th and 10th rank based on weight (0.0500) (0.0677), respectively. The authors have evaluated the performance of factors for securing the HIS with the help 4)- (9). By using the equation ( 15), we calculated the normalized weights of the matrix.…”
Section: Results and Outcomementioning
confidence: 99%
“…Many researchers are already working on the MCDM approach with different aims in this league. 9 Rajeev et al (2020) applied fuzzy-based AHP-TOPSIS procedure for evaluating the impact of harmful factors of HIS. In this study, the authors prioritized the harmful factors which affect the data layers used in HIS.…”
Section: Introductionmentioning
confidence: 99%
“…The study also tells that assuring data security and secure availability of data in between patient, doctor and healthcare service provider is a challenging Symmetry 2020, 12, 664 2 of 24 task in electronic healthcare environment. Thus, it is evident that the issue of information security is has been a contentious issue for a long time now and many researchers are working on this from different perspectives [3,4]. But the challenges and criticalness of this issue demand a more justified solution for information security assurance in healthcare [5,6].…”
Section: Introductionmentioning
confidence: 99%