1996
DOI: 10.1016/s0020-7101(96)01225-1
|View full text |Cite
|
Sign up to set email alerts
|

Technical means for securing health information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1999
1999
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Thus, implementing such working lists, linked with a general repository of identities, increases the complexity of the management of access controls. It results in organizational costs in addition to traditional ones: hardware, software and network procedures [18]. If the initialization of the lists linking users to functional groups is a huge but feasible task, the updating procedures need to be very careful.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, implementing such working lists, linked with a general repository of identities, increases the complexity of the management of access controls. It results in organizational costs in addition to traditional ones: hardware, software and network procedures [18]. If the initialization of the lists linking users to functional groups is a huge but feasible task, the updating procedures need to be very careful.…”
Section: Discussionmentioning
confidence: 99%
“…Network expansion of healthcare service providers promotes the policy of sharing data between related parties [ 17 ], which increases the susceptibility of patient information transferred via electronic forms, including data ownership issues [ 18 ], responsibility for ensuring confidentiality [ 19 ], and responsibility for data integrity [ 20 ]. Health facilities are open public organizations [ 14 ], causing difficulties in access control and physical security [ 21 ], even though they have higher vulnerability to information security risks [ 16 ]. Insider threats posed by people with legitimate access to information systems can come from temporary staff, such as medical students, residents, or interns, who have the same need for access to medical data as permanent employees [ 14 , 16 ].…”
Section: Introductionmentioning
confidence: 99%