2019
DOI: 10.1108/ics-05-2019-0060
|View full text |Cite
|
Sign up to set email alerts
|

Towards a maturity model for health-care cloud security (M2HCS)

Abstract: Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…to propose a novel maturity model for health-care cloud security, which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-carespecific cyber security metrics [72] 3.2 to use innovative technology in healthcare to treat, diagnose and monitor patients [43] 2.2 to investigate medical information security to gain a better understanding of trends in research related to medical information security [96] 1.2 to present a novel approach, called BotDet, for botnet Command and Control traffic detection to defend against malware attacks in critical ultrastructure systems [44] 2.2 to develop a model of factors associated with healthcare data breaches. Variables were operationalized as the healthcare facilities' level of exposure, level of security, and organizational factors [45] 2.2 to record public and physicians' awareness, expectations for, and ethical concerns about the use of EHRs [46] 2.2…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…to propose a novel maturity model for health-care cloud security, which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-carespecific cyber security metrics [72] 3.2 to use innovative technology in healthcare to treat, diagnose and monitor patients [43] 2.2 to investigate medical information security to gain a better understanding of trends in research related to medical information security [96] 1.2 to present a novel approach, called BotDet, for botnet Command and Control traffic detection to defend against malware attacks in critical ultrastructure systems [44] 2.2 to develop a model of factors associated with healthcare data breaches. Variables were operationalized as the healthcare facilities' level of exposure, level of security, and organizational factors [45] 2.2 to record public and physicians' awareness, expectations for, and ethical concerns about the use of EHRs [46] 2.2…”
Section: Discussionmentioning
confidence: 99%
“…to propose a novel maturity model for health-care cloud security, which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-carespecific cyber security metrics [72] 3 to provide an overview of the current methodologies used to ensure data security, and a description of one successful approach to balancing access and privacy [37] 1.3…”
Section: Publications' Aim Subclassmentioning
confidence: 99%
“…Juliadotter and Choo [119] 2015 Risk Theoretical Both Otero [120] 2015 Risk Theoretical Defender Solic et al [121] 2015 Risk Theoretical Defender Sugiura et al [122] 2015 Risk Theoretical Defender Wei et al [123] 2015 Risk Theoretical Defender You et al [75] 2015 Security Theoretical Defender Brožová et al [51] 2016 Risk Theoretical Defender Brynielsson et al [124] 2016 Awareness Theoretical Defender Granåsen and Andersson [125] 2016 Resilience Theoretical Defender Orojloo and Azgomi [126] 2016 Risk Theoretical Attacker Aiba and Hiromatsu [127] 2017 Risk Theoretical Defender Damenu and Beaumont [103] 2017 Risk Implementation Defender Ramos et al [41] 2017 Review -Defender Rass et al [52] 2017 Risk Theoretical Defender Alohali et al [128] 2018 Risk Theoretical Defender Li et al [82] 2018 Risk Theoretical Defender Morrison et al [43] 2018 Review -Both Pramod and Bharathi [129] 2018 Risk Theoretical Defender Proença and Borbinha [89] 2018 Maturity Implementation Defender Rueda and Avila [130] 2018 Risk Theoretical Defender Shokouhyar et al [104] 2018 Risk Theoretical Defender Stergiopoulos et al [131] 2018 Risk Theoretical Defender You et al [132] 2018 Maturity Theoretical Defender Akinsanya et al [133] 2019 Maturity Theoretical Defender Bharathi [134] 2019 Risk Theoretical Defender Fertig et al [135] 2019 Awareness Theoretical Defender Husák et al [31] 2019 Review -Defender Salih et al [136] 2019 Risk Theoretical Defender Cadena et al [34] 2020 Review -Defender Wirtz and Heisel [137] 2020 Risk Theoretical Defender Ganin et al [138] 2020 Risk Theoretical Defender Luh et al [90] 2020 Risk Theoretical Both Table A3. The in...…”
Section: Validation Methodsmentioning
confidence: 99%
“…US energy sector and the DOE defined the MM as "a set of characteristics, attributes, indicators, or patterns that represent capability and progression in a particular discipline" (C2M2, 2021). According to Le and Hoang (2016) and Akinsanya et al (2019), a MM is a good tool that helps organizations evaluate performance and identify weaknesses to build improvement plans to attain their goals. Curtis and Mehravari (2015) mentioned that the MM provides standards used to assess the current level of capability and maturity of processes and practices that help the organizations put their goals based on their level of importance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The hybrid, however, is a combination of both the progression and the MMs (Allen and Mehravari, 2014). In another study by Akinsanya et al (2019), the researchers define the cyber security MM as "a tool that can track improvements made over time from embedding security within an organization's daily and strategic workflows and between similar organizations in an industry." There is a big necessity for cybersecurity MMs, which can enable people to better manage organizations (Stevanovi c, 2011) and assist in evaluating their current procedures for cybersecurity assurance (Payette et al, 2015).…”
Section: Literature Reviewmentioning
confidence: 99%