Abstract
We show in this poster the various types of threats to information security in health informatics and try identifying the promising technical solutions to addressing these threats. In addition, we contend that information security in health informatics does not rely merely on technical solutions but on a holistic solution incorporating more socio-technical understandings. Though the challenges to adoption of information security controls in health informatics are usually reflected on the technologies’ usability aspect, they are deeply rooted on the socio-technical level involving various human factors such as the gap in the working culture, in the professional language and its implications, and in the understanding of the workflow and the operational mechanisms in the two fields - healthcare and security. We will preliminarily investigate in this poster a promising approach to modelling and measuring the influences from the socio-technical aspect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wikipedia: Medical Data Breach. https://en.wikipedia.org/wiki/Medical_data_breach. Accessed 07 Apr 2016
Ahmed, M., Ahamad, M.: Combating abuse of health data in the age of eHealth Exchange. In: 2014 IEEE International Conference on Healthcare Informatics, pp. 109–118. IEEE Press (2014)
Boatman, K.: Beware the Rise of Ransomware. http://us.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware. Accessed 07 Apr 2016
Los Angeles Hospital Paid Hackers $17,000 Ransom in Bitcoins. http://www.reuters.com/article/us-california-hospital-cyberattack-idUSKCN0VR085. Accessed 07 Apr 2016
Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74–82 (2015)
Vallance, C.: Could Hackers Break My Heart via My Pacemaker? http://www.bbc.com/news/technology-34899713. Accessed 07 Apr 2016
Subedar, H., El-Khatib, K.: Privacy and security concerns for health data collected using off-the-shelf health monitoring devices. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 341–348 (2015)
Libert, T.: Privacy implications of health information seeking on the web. Commun. ACM 58(3), 68–77 (2015)
SANS Institute Survey: New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations (2014). https://www.sans.org/reading-room/whitepapers/analyst/threats-drive-improved-practices-state-cybersecurity-health-care-organizations-35652. Accessed 07 Apr 2016
The HITECH Act. https://en.wikipedia.org/wiki/Health_Information_Technology_for_Economic_and_Clinical_Health_Act#cite_note-20. Accessed 07 Apr 2016
Annual report to congress: FISMA, 18 March 2016. https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy_2015_fisma_report_to_congress_03_18_2016.pdf. Accessed 07 Apr 2016
2015 HIMSS Cybersecurity Survey - Full Report. http://www.himss.org/2015-cybersecurity-survey/full-report. Accessed 07 Apr 2016
Leonard, K.: Hospital of Yesterday: The Biggest Changes in Health Care. http://health.usnews.com/health-news/hospital-of-tomorrow/articles/2014/07/15/hospital-of-yesterday-the-biggest-changes-in-health-care. Accessed 07 Apr 2016
Ritchie, A., Marbury, D., Verdon, D., Mazzolini, C., Boyles, S.: Shifting reimbursement models: the risks and rewards for primary care. http://medicaleconomics.modernmedicine.com/medical-economics/content/tags/aca/shifting-reimbursement-models-risks-and-rewards-primary-care?page=full. Accessed 07 Apr 2016
Keim, B.: IBM’s Dr. Watson will see you…someday. IEEE Spectr. 52(6), 76–77 (2015)
Maksimovi, M., Vujovi, V., Perii, B.: A custom internet of things healthcare system. In: 10th Iberian Conference on Information Systems and Technologies (2015)
Dimick, C.: Healthcare Still Unprepared for Cybersecurity Attacks. http://journal.ahima.org/2015/10/20/report-healthcare-still-unprepared-for-cybersecurity-attacks/. Accessed 07 Apr 2016
Kovacs, E.: 1,400 Flaws Found in Outdated CareFusion Medical Systems. http://www.securityweek.com/1400-flaws-found-outdated-carefusion-medical-systems. Accessed 07 Apr 2016
Fernando, J.: The elephant in the room: health information system security and the user-level environment. In: International Conference for Internet Technology and Secured Transactions (2009)
Mirkovic, J., Skipenes, E., Christiansen, E.K., Bryhni, H.: Security and privacy legislation guidelines for developing personal health records. In: Second International Conference on eDemocracy & eGovernment (2015)
Machanavajjhala, A., Kifer, D.: Designing statistical privacy for your data. Commun. ACM 58(3), 58–67 (2015)
Popa, R.A., Zeldovich, N.: How to compute with data you can’t see. IEEE Spectr. 52(8), 42–47 (2015)
Breebaart, J., Yang, B., Dulman, I., Busch, C.: Biometric template protection. Datenschutz und Datensicherheit-DuD 33(5), 29–304 (2009)
Feigenbaum, J., Ford, B.: Seeking anonymity in an internet panopticon. Commun. ACM 58(10), 58–69 (2015)
Guo, L., Zhang, C., Sun, J., Fang, Y.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2013)
Acknowledgments
This work is partially funded by the strategical funding from the Center for Cyber and Information Security (ccis.no) to support the research initiative on health and welfare security.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Yang, B. (2016). What Make You Sure that Health Informatics Is Secure. In: Chang, C., Chiari, L., Cao, Y., Jin, H., Mokhtari, M., Aloulou, H. (eds) Inclusive Smart Cities and Digital Health. ICOST 2016. Lecture Notes in Computer Science(), vol 9677. Springer, Cham. https://doi.org/10.1007/978-3-319-39601-9_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-39601-9_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39600-2
Online ISBN: 978-3-319-39601-9
eBook Packages: Computer ScienceComputer Science (R0)