Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness

被引:1
|
作者
Shahri, Ahmad Bakhtiyari [1 ]
Ismail, Zuraini [2 ]
Ab Rahim, Nor Zairah [2 ]
机构
[1] Univ Teknol Malaysia, Fac Comp Sci & Informat Syst, Johor Baharu 81310, Malaysia
[2] Univ Teknol Malaysia, AIS, Kuala Lumpur 54100, Malaysia
关键词
Security culture; Security communication; Security education and training; Health information system; Security effectiveness;
D O I
10.1007/978-3-642-36981-0_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of information systems (IS) depends on many factors, however, numerous technical advances alone cannot always create a safe and secure environment. Security incidents related to patients' data in healthcare organizations continue to increase due to human behaviors causes serious concerns. This study attempts the exploration of security culture in Health Information Systems (HIS). The scope of this paper is confined to the literature review on existing models on security culture. A conceptual model was constructed in identifying the antecedents that could influence security culture in HIS security effectiveness. We found that education and training, and communication may contribute towards a more effective implementation of security culture for HIS users. This in-progress work will then proceed to the next phase in evaluating the proposed model.
引用
收藏
页码:213 / 220
页数:8
相关论文
共 50 条
  • [21] A Simulation Model of Information Systems Security
    Pendegraft, Norman
    Rounds, Mark
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 62 - 74
  • [22] A Security Technique for Authentication and Security of Medical Images in Health Information Systems
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    [J]. 2015 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA), 2015, : 8 - 13
  • [23] Using of Fuzzy Cognitive Modeling in Information Security Systems Constructing
    Kulyk, Mykola
    Khoma, Volodymyr
    Kozlovskyi, Valerii
    Mischenko, Andrii
    Khlaponin, Yurii
    Janisz, Karina
    Falat, Pawel
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 408 - 411
  • [24] Information security culture
    Martins, A
    Eloff, J
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 203 - 214
  • [25] Analyzing information security culture: Increased trust by an appropriate information security culture
    Schlienger, T
    Teufel, S
    [J]. 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 405 - 409
  • [26] Conceptual Information Systems discussed through an IT-security tool
    Becker, K
    Stumme, G
    Wille, R
    Wille, U
    Zickwolff, M
    [J]. KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: METHODS, MODELS, AND TOOLS, 2000, 1937 : 352 - 365
  • [27] Security policy conceptual modeling and formalization for networked information systems
    Trcek, D
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1716 - 1723
  • [28] An Approach to Assessing Information Security Effectiveness in Control Systems
    V. I. Korzhik
    D. C. Nguyen
    K. A. Akhrameeva
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 879 - 887
  • [29] An Approach to Assessing Information Security Effectiveness in Control Systems
    Korzhik, V., I
    Nguyen, D. C.
    Akhrameeva, K. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 879 - 887
  • [30] ACTEN: A CONCEPTUAL MODEL FOR SECURITY SYSTEMS DESIGN.
    Fugini, Mariagrazia
    Martella, Giancarlo
    [J]. 1600, (03):