Journal of Information Security

Volume 3, Issue 2 (April 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS

HTML  XML Download Download as PDF (Size: 630KB)  PP. 169-176  
DOI: 10.4236/jis.2012.32020    8,293 Downloads   13,121 Views  Citations

ABSTRACT

Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health Information Systems (HIS) remains a continual concern for system developers. The main aim of this paper is to present a research agenda of threats to HIS. A cohesive completeness study on the identification of possible threats on HIS was conducted. This study reveals more than 70 threats for HIS. They are classified into 30 common criteria. The abstraction was carried out using secondary data from various research databases. This work-in-progress study will proceed to the next stage of ranking the security threats for assessing risk in HIS. This classification of threats may provide some insights to both researchers and professionals, who are interested in conducting research in risk management of HIS security.

Share and Cite:

A. Bakhtiyari Shahri and Z. Ismail, "A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS," Journal of Information Security, Vol. 3 No. 2, 2012, pp. 169-176. doi: 10.4236/jis.2012.32020.

Cited by

[1] Verticals in 5G MEC-use cases and security challenges
2021
[2] Providing a rational conceptual model for classifying critical infrastructure cyber threats
2019
[3] PLASMA–Platform for Service Management in Digital Remote Maintenance Applications
2019
[4] Business continuity-inspired fuzzy risk assessment framework for hospital information systems
2019
[5] Comparative Analysis of Hospital Information Management Systems Among Healthcare Workers in Two Selected Hospitals in Kenya
2018
[6] Practical security aspects of the internet of things
Cybersecurity for Industry 4.0, 2017
[7] Secure IoT Devices for the Maintenance of Machine Tools
Procedia CIRP, 2017
[8] Designing and implementing an information accountability framework for usable and useful eHealth systems
2017
[9] Information security risk management for computerized health information systems in hospitals: a case study of Iran
Risk Management and Healthcare Policy, 2016
[10] Study to Identify Threats to Information Systems in Organizations and Possible Countermeasures through Policy Decisions and Awareness Programs to Ensure …
2016
[11] Study to identify threats to Information Systems in organizations and possible countermeasures through policy decisions and awareness programs to ensure the …
2016
[12] Security analysis of a patient monitoring system for the Internet of Things in eHealth
2015
[13] Оценка состояния защищенности данных организации в условиях возможности реализации угроз информационной безопасности
2015
[14] Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android
JMIR mHealth and uHealth, 2015
[15] Use of hospital management information systems among healthcare workers at Kenyatta national and Mater hospitals
Thesis, 2015
[16] Information Privacy Concerns in the Use of Social Media Among Healthcare Practitioners: A Systematic Literature Review
Advanced Science Letters, 2014
[17] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure
Electronic Markets, 2014
[18] Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
AB Shahri, Z Ismail, NZ Rahim, 2014
[19] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German …
Electronic Markets, 2014
[20] Privacy challenges in electronic medical records: A systematic review
Proceedings of the Knowledge …, 2014
[21] Security Effectiveness in Health Information System: Through Improving the Human Factors by Education and Training.
Australian Journal of Basic & Applied Sciences, 2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.