Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey

被引:10
|
作者
Yeng, Prosper Kandabongee [1 ]
Yang, Bian [1 ]
Snekkenes, Einar Arthur [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
来源
PHEALTH 2019 | 2019年 / 261卷
关键词
Social-Culture; Information Security; Social Demography; Healthcare Staff; BEHAVIOR;
D O I
10.3233/978-1-61499-975-1-239
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, evaluation techniques and the challenges to their implementation. The results would be used for emperical studies in a hospital setting in Norway on Healthcare Security Practice Analysis, Modeling and Incentivization (HSPAMI). Human Aspect of Information Security Questionnaire was identified as robust and comprehensive tool for gathering staff security practices. Integrated theories was being adopted to form a comprehensive staffs' characteristics. A mixed-method for evaluating the theories was also identified to be the best strategy.
引用
收藏
页码:239 / 245
页数:7
相关论文
共 50 条
  • [1] Towards Mitigating Uncertainty of Data Security Breaches and Collusion in Cloud Computing
    Tchernykh, Andrei
    Babenko, Mikhail
    Chervyakov, Nikolay
    Cortes-Mendoza, Jorge M.
    Kucherov, Nikolay
    Miranda-Lopez, Vanessa
    Deryabin, Maxim
    Dvoryaninova, Inna
    Radchenko, Gleb
    [J]. 2017 28TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS (DEXA), 2017, : 137 - 141
  • [2] Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices
    Yeng, Prosper K.
    Yang, Bian
    Snekkenes, Einar Arthur
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2019, : 397 - 404
  • [3] Data breaches in healthcare: security mechanisms for attack mitigation
    Zlatolas, Lili Nemec
    Welzer, Tatjana
    Lhotska, Lenka
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 8639 - 8654
  • [4] Mitigating the consequences of electronic health record data breaches for patients and healthcare workers
    Looi, Jeffrey C. L.
    Allison, Stephen
    Bastiampillai, Tarun
    Maguire, Paul A.
    Kisely, Steve
    Looi, Richard C. H.
    [J]. AUSTRALIAN HEALTH REVIEW, 2024, 48 (01) : 4 - 7
  • [5] Understanding Healthcare Data Breaches: Crafting Security Profiles Completed Research
    McLeod, Alexander
    Dolezel, Diane
    [J]. AMCIS 2018 PROCEEDINGS, 2018,
  • [6] WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES
    Li, Wilson Weixun
    Leung, Alvin Chung Man
    Yue, Wei Thoo
    [J]. MIS QUARTERLY, 2023, 47 (01) : 317 - 342
  • [7] A Survey on Healthcare Data: A Security Perspective
    Singh, A. K.
    Anand, A.
    Lv, Z.
    Ko, H.
    Mohan, A.
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [8] Towards a practical healthcare information security model for healthcare institutions
    Dwivedi, A
    Bali, RK
    Belsis, MA
    Naguib, RNG
    Every, P
    Nassar, NS
    [J]. ITAB 2003: 4TH INTERNATIONAL IEEE EMBS SPECIAL TOPIC CONFERENCE ON INFORMATION TECHNOLOGY APPLICATIONS IN BIOMEDICINE, CONFERENCE PROCEEDINGS: NEW SOLUTIONS FOR NEW CHALLENGES, 2003, : 114 - 117
  • [9] Assessing liability arising from information security breaches in data privacy
    Mitrakas, Andreas
    [J]. INTERNATIONAL DATA PRIVACY LAW, 2011, 1 (02) : 129 - 136
  • [10] Analytical Techniques for Decision Making on Information Security for Big Data Breaches
    Albeshri, Aiiad
    Thayananthan, Vijey
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2018, 17 (02) : 527 - 545