The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Exploring Information Security Risks in Healthcare Systems
|
Author(s): Amy Ray (Bentley College, USA)and Sue Newell (Bentley College, USA, and Warwick Business School, UK)
Copyright: 2010
Pages: 7
Source title:
Health Information Systems: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Joel J.P.C. Rodrigues (Senac Faculty of Ceará, Fortaleza-CE, Brazil; Instituto de Telecomunicações, Portugal)
DOI: 10.4018/978-1-60566-988-5.ch110
Purchase
|
Abstract
The volume and severity of information security breaches encountered continues to increase as organizations, including healthcare organizations, struggle to identify more effective security policies and procedures. Publicly available guidelines such as GASSP or ISO17799 that are designed to facilitate development of effective security policies and procedures have been criticized for, among other things, inadequate attention to differences in organizational security needs (Baskerville & Siponen, 2002), and for inadequate attention to the social dimensions of security problems (Dhillon & Backhouse, 2001). In this contribution, we argue that the diversity of organizational security needs, as well as the need to recognize the social dimensions to security problems, will continue to grow as companies move away from employing unique, proprietary approaches to software and network development, in favor of adopting standards-based plug-and-play applications, and related standards-based methods and technologies designed to enable interorganizational as well as local systems interoperability.
Related Content
.
© 2024.
27 pages.
|
.
© 2024.
10 pages.
|
.
© 2024.
13 pages.
|
.
© 2024.
6 pages.
|
.
© 2024.
23 pages.
|
.
© 2024.
14 pages.
|
.
© 2024.
7 pages.
|
|
|