3rd Annual Global Healthcare Conference (GHC 2014) 2014
DOI: 10.5176/2251-3833_ghc14.29
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security and Privacy of Healthcare Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Therefore, to provide good service it is wise to secure the data and transfer it accurately through a fully trusted medium within a certain time to the owner of those data [18]. The actual challenges, in this case, are to manage the security of the location where the data is stored as well as securing the network through which the huge amount of data transmits from source to destination [14]. Many aspects that are to be taken into account for ehealth security can be, authentication i.e.…”
Section: E-health System Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, to provide good service it is wise to secure the data and transfer it accurately through a fully trusted medium within a certain time to the owner of those data [18]. The actual challenges, in this case, are to manage the security of the location where the data is stored as well as securing the network through which the huge amount of data transmits from source to destination [14]. Many aspects that are to be taken into account for ehealth security can be, authentication i.e.…”
Section: E-health System Security Requirementsmentioning
confidence: 99%
“…It should be taken into consideration that the e-health should be scalable, flexible to any changes and should have a user-friendly interface [18]. The other important feature that could be added is availability of the system whenever and wherever it is needed to process and regulate the patient's data, reliability of the system to avoid any errors while providing services to its users and interoperability where the system should operate according to some standard communication protocols when communicating between different service providers [14].…”
Section: E-health System Security Requirementsmentioning
confidence: 99%
“…Failure to comply with personal data protection legislation, healthcare facilities may face civil and legal penalties [14]. In the long run, such non-compliance may cause some harm to the employees or patients [34].…”
Section: Introductionmentioning
confidence: 99%