Systemic Aspects of Security Technology in Hospitals: Combining STEEPVSWOT Methodologies in Risk Analysis of Hospitals

被引:2
|
作者
Kaivo-Oja, Jari [1 ]
机构
[1] Turku Sch Econ & Business Adm, Finland Futures Res Ctr, Turku, Finland
来源
关键词
STEEPV-SWOT; STEEPV; SWOT; hospital security; hospital terror risk management; resiliency; WEAK SIGNALS; INFORMATION; KNOWLEDGE; ACQUISITION; PERFORMANCE; EVOLUTION; NETWORKS; QUALITY; SENSE; TIES;
D O I
10.3233/978-1-60750-503-7-97
中图分类号
R4 [临床医学];
学科分类号
1002 ; 100602 ;
摘要
Coping with risk situations in hospitals can be complex and controversial. Government and industries have devoted considerable resources to develop and apply techniques of risk analysis and risk characterization in order to make better informed and more trustworthy decisions about security threats to human health, welfare and the environment. Risk analysis methods often fail to meet the expectation of being able to improve decision making. One reason lies in the inadequacies of available techniques for analyzing risks. In recent years, awareness of the fact that hospitals may be targets of terrorism attacks has increased. In addition, security awareness in hospitals and associated health centers has increased in western countries. This article pays special attention to technology related risks and threats in hospitals by analyzing systemic aspects of security technology and associated risks in hospitals. The systemic analysis is done separately on hospital systems and on surrounding environmental systems. Typical risk and threat analyses are performed by combining STEEPV methodology and SWOT-analyses. This kind of quite simple but flexible methodology is a promising tool in the analysis of risks and systemic aspects of security technology in hospitals. Relevant wild cards of hospital services relying on available security technologies are discussed widely. In short, the STEEPV-SWOT methodological approach includes four phases: (1) Weak signal identification related to the internal and external STEEPV systems of a hospital, (2) Listing the most challenging systemic STEEPV Wild Cards, (3) SWOT analyses on STEEPV wild cards, (4) Risk and security management plan based on systemic SWOT analyses of the most serious and risky wild cards. It is important that hospital stakeholders are active partners in this risk management and security analysis process.
引用
收藏
页码:97 / 116
页数:20
相关论文
共 50 条
  • [21] Uniform Approach of Risk Communication in Distributed IT Environments Combining Safety and Security Aspects
    Fruth, Jana
    Nett, Edgar
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, 2014, 8696 : 289 - 300
  • [22] Information security risk management for computerized health information systems in hospitals: a case study of Iran
    Zarei, Javad
    Sadoughi, Farahnaz
    RISK MANAGEMENT AND HEALTHCARE POLICY, 2016, 9 : 75 - 85
  • [23] Method Engineering Approach to the Adoption of Information Technology Governance, Risk and Compliance in Swiss Hospitals
    Krey, Mike
    Furnell, Steven
    Harriehausen, Bettina
    Knoll, Matthias
    PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2012, : 408 - 417
  • [24] Risk analysis and safety assessment of hospitals against disasters: A systematic review
    Moradi, Seyed Mobin
    Nekoei-Moghadam, Mahmood
    Abbasnejad, Ahmad
    Hasheminejad, Naser
    JOURNAL OF EDUCATION AND HEALTH PROMOTION, 2021, 10 (01)
  • [26] Improving Technology Investment Decisions at Hospitals Through System Dynamics and Decision Analysis
    Rojas-Cordova, Alba
    Baghaei-Lakeh, Arash
    Zhang, Hui
    Wernz, Christian
    Rahmandad, Hazhir
    Slonim, Anthony D.
    Caroline, Ari
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 1517 - 1526
  • [27] Analysis of the Exploration of Security and Privacy for Healthcare Management Using Artificial Intelligence: Saudi Hospitals
    Almalawi, Abdulmohsen
    Khan, Asif Irshad
    Alsolami, Fawaz
    Abushark, Yoosef B.
    Alfakeeh, Ahmed S.
    Mekuriyaw, Walelign Dinku
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [28] Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces
    Yang, Fan
    Aotani, Tomoyuki
    Masuhara, Hidehiko
    Nielson, Flemming
    Nielson, Hanne Riis
    COORDINATION MODELS AND LANGUAGES, COORDINATION 2011, 2011, 6721 : 202 - 218
  • [29] Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
    Park, Woo-Sung
    Seo, Sun-Won
    Son, Seung-Sik
    Lee, Mee-Jeong
    Kim, Shin-Hyo
    Choi, Eun-Mi
    Bang, Ji-Eon
    Kim, Yea-Eun
    Kim, Ok-Nam
    HEALTHCARE INFORMATICS RESEARCH, 2010, 16 (02) : 89 - 99
  • [30] Integrating future-oriented technology analysis and risk assessment methodologies
    Koivisto, Raija
    Wessberg, Nina
    Eerola, Annele
    Ahlqvist, Toni
    Kivisaari, Sirkku
    Myllyoja, Jouko
    Halonen, Minna
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2009, 76 (09) : 1163 - 1176