2015
DOI: 10.15394/jdfsl.2015.1196
|View full text |Cite
|
Sign up to set email alerts
|

Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments

Abstract: As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and organizations under obligations to take actions to prevent data breach. Among various threats, insider threats have been identified as a major threat on data loss. Thus, effective mechanisms to control insider threats on data loss are urgently needed. The objective of this research is to address data loss prevention challenges in healthcare enterpr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…National infrastructure, corporations, and agencies have fallen victims to cyber-attacks, and millions of sensitive data records have been compromised, especially in financial and healthcare sectors [1], [2]. Such security breaches not only result in substantial financial losses, but also greatly hurt the confidence of customers, business partners and stakeholders [3].…”
Section: Introductionmentioning
confidence: 99%
“…National infrastructure, corporations, and agencies have fallen victims to cyber-attacks, and millions of sensitive data records have been compromised, especially in financial and healthcare sectors [1], [2]. Such security breaches not only result in substantial financial losses, but also greatly hurt the confidence of customers, business partners and stakeholders [3].…”
Section: Introductionmentioning
confidence: 99%
“…Internal incidents again are due to intentional and unintentional loss [45]. It is a challenging task for any system to detect and prevent an internal and intentional leak of information [47]. The popular channels through which data leak incidents occurred in different organizations in the past are removable storage, Web Applications, Email, Instant Messaging applications, printed and scanned physical, and digitally stored documents [2], [37].…”
Section: A Background Of Data Leak Prevention Systemsmentioning
confidence: 99%
“…In both domains, individual's private data are shared with institutions. An exploration to identify leak channels and internal threat paths and finally, a model to guide the leak detection has been proposed in the study by Tu et al [47].…”
Section: E Related Studiesmentioning
confidence: 99%
“…Security has become one of the major topics for various organizations, because of the increase in the number of incident in the past several years. Over the past few years, a large number of fraud incidents have been committed, especially in the financial and healthcare sectors [10,11]. Such security breaches not only result in substantial financial losses, but also greatly hurt the confidence of customers, business partners and stakeholders [12].…”
Section: Importance Of Safety and Securitymentioning
confidence: 99%