The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment, thus making our lives far more comfortable. However, the present day healthcare industry has also become the main victim of external as well as internal attacks. Data breaches are not just a concern and complication for security experts; they also affect clients, stakeholders, organizations, and businesses. Though the data breaches are of different types, their impact is almost always the same. This study provides insights into the various categories of data breaches faced by different organizations. The main objective is to do an in-depth analysis of healthcare data breaches and draw inferences from them, thereby using the findings to improve healthcare data confidentiality. The study found that hacking/IT incidents are the most prevalent forms of attack behind healthcare data breaches, followed by unauthorized internal disclosures. The frequency of healthcare data breaches, magnitude of exposed records, and financial losses due to breached records are increasing rapidly. Data from the healthcare industry is regarded as being highly valuable. This has become a major lure for the misappropriation and pilferage of healthcare data. Addressing this anomaly, the present study employs the simple moving average method and the simple exponential soothing method of time series analysis to examine the trend of healthcare data breaches and their cost. Of the two methods, the simple moving average method provided more reliable forecasting results.
It is critical to develop secure software with long-term performance and capability to withstand and forestall the growing competition in the software development industry. To enhance the potential of Confidentiality, Integrity, and Availability (CIA), a mechanism is required to built in and secure the durability at the time of software development. Security of a software product is durable if the software works efficiently for user's satisfaction up to the expected duration. Despite the fact that focusing on security which is durable enough considerably reduces maintenance cost, the work done on addressing security as well as durability issues simultaneously during software development remains minimal. To achieve durable security, there is a need to fill the gap between security and durability through identifying and establishing a relationship between security and durability attributes. This article extends the concept of the life span of security services and assesses as well as prioritizes security durability attributes by taking a real-time case study. While building durable security, security experts often face complicated decision problems. Hence, multi-criteria decision-making techniques have been used to solve the issues of measuring conflicting tangible/intangible criteria. In addition, the fuzzy simple average method is used for finding out the rating of security durability attributes. The work has been demonstrated by taking a case study. The results of the study would be useful for security developers to assure the importance of attributes for improving the duration of security.
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's requirements with security perspective. Current approaches of usable-security emphasizes on building systems that are easy to use and secure as well. Hence, this paper is recognizing usability-security as a problem with different attributes contributing towards it. Further, there is a need to assess this problem for the satisfaction of the end user. In this context, this study proposes the track of Fuzzy AHP-TOPSIS (Analytic Hierarchy Process-Technique for Order of Preference by Similarity to Ideal Solution) technique to assess the usable-security of web application and also identifies the most prioritized attribute contributing towards building usable-security of web application. Moreover, to corroborate the efficacy of the proposed technique, the authors have tested the results on the institutional web applications. The results of the assessment undertaken in this study and the findings tabulated thereafter will be a helpful reckoner for the developers while designing web applications that afford optimum usable-security. INDEX TERMS Web application, usable-security, decision analysis, fuzzy TOPSIS, fuzzy AHP.
Background: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. Methods: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. Results: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services.
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications. This accelerated growth in the use of web applications has led to increase in the complexity of security and hence the present day developers have to contribute more significantly towards meeting the users' requirements. However, the high security of web application is not yet efficacious enough because the durability of web application is not as much as it should be. In this context, it is important to consider that ensuring sustainability of security at the early stage of web application development process may reduce costs and rework entailed during the development of secure and durable web applications. Hence, there is a need to focus on increasing the lifespan of a secure web application. Quantitative estimation of security-durability plays a significant role for improving the lifespan of a secure web application. Thus, to optimize the security assurance effort for a specific lifespan , this paper is aimed at estimating the securitydurability of web application. For estimating security-durability, this paper uses a hybrid approach of Hesitant Fuzzy (HF) sets, Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) techniques. The effectiveness of the combined approach of HF-AHP-TOPSIS is tested for its accuracy in a web application for an academic institution, Babasaheb Bhimrao Ambedkar University in India. To check the sensitivity of outcomes, authors of the paper have taken altered forms of the University's web application. The result established contains the security-durability assessment. This work seeks to be an important contribution in enhancing the security-durability and would be beneficial for experts who are working in this domain.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.