Nothing Special   »   [go: up one dir, main page]

Skip to main content

What Make You Sure that Health Informatics Is Secure

  • Conference paper
  • First Online:
Inclusive Smart Cities and Digital Health (ICOST 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9677))

Included in the following conference series:

  • 2372 Accesses

Abstract

We show in this poster the various types of threats to information security in health informatics and try identifying the promising technical solutions to addressing these threats. In addition, we contend that information security in health informatics does not rely merely on technical solutions but on a holistic solution incorporating more socio-technical understandings. Though the challenges to adoption of information security controls in health informatics are usually reflected on the technologies’ usability aspect, they are deeply rooted on the socio-technical level involving various human factors such as the gap in the working culture, in the professional language and its implications, and in the understanding of the workflow and the operational mechanisms in the two fields - healthcare and security. We will preliminarily investigate in this poster a promising approach to modelling and measuring the influences from the socio-technical aspect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wikipedia: Medical Data Breach. https://en.wikipedia.org/wiki/Medical_data_breach. Accessed 07 Apr 2016

  2. Ahmed, M., Ahamad, M.: Combating abuse of health data in the age of eHealth Exchange. In: 2014 IEEE International Conference on Healthcare Informatics, pp. 109–118. IEEE Press (2014)

    Google Scholar 

  3. Boatman, K.: Beware the Rise of Ransomware. http://us.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware. Accessed 07 Apr 2016

  4. Los Angeles Hospital Paid Hackers $17,000 Ransom in Bitcoins. http://www.reuters.com/article/us-california-hospital-cyberattack-idUSKCN0VR085. Accessed 07 Apr 2016

  5. Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74–82 (2015)

    Article  Google Scholar 

  6. Vallance, C.: Could Hackers Break My Heart via My Pacemaker? http://www.bbc.com/news/technology-34899713. Accessed 07 Apr 2016

  7. Subedar, H., El-Khatib, K.: Privacy and security concerns for health data collected using off-the-shelf health monitoring devices. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 341–348 (2015)

    Google Scholar 

  8. Libert, T.: Privacy implications of health information seeking on the web. Commun. ACM 58(3), 68–77 (2015)

    Article  Google Scholar 

  9. SANS Institute Survey: New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations (2014). https://www.sans.org/reading-room/whitepapers/analyst/threats-drive-improved-practices-state-cybersecurity-health-care-organizations-35652. Accessed 07 Apr 2016

  10. The HITECH Act. https://en.wikipedia.org/wiki/Health_Information_Technology_for_Economic_and_Clinical_Health_Act#cite_note-20. Accessed 07 Apr 2016

  11. Annual report to congress: FISMA, 18 March 2016. https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy_2015_fisma_report_to_congress_03_18_2016.pdf. Accessed 07 Apr 2016

  12. 2015 HIMSS Cybersecurity Survey - Full Report. http://www.himss.org/2015-cybersecurity-survey/full-report. Accessed 07 Apr 2016

  13. Leonard, K.: Hospital of Yesterday: The Biggest Changes in Health Care. http://health.usnews.com/health-news/hospital-of-tomorrow/articles/2014/07/15/hospital-of-yesterday-the-biggest-changes-in-health-care. Accessed 07 Apr 2016

  14. Ritchie, A., Marbury, D., Verdon, D., Mazzolini, C., Boyles, S.: Shifting reimbursement models: the risks and rewards for primary care. http://medicaleconomics.modernmedicine.com/medical-economics/content/tags/aca/shifting-reimbursement-models-risks-and-rewards-primary-care?page=full. Accessed 07 Apr 2016

  15. Keim, B.: IBM’s Dr. Watson will see you…someday. IEEE Spectr. 52(6), 76–77 (2015)

    Article  MathSciNet  Google Scholar 

  16. Maksimovi, M., Vujovi, V., Perii, B.: A custom internet of things healthcare system. In: 10th Iberian Conference on Information Systems and Technologies (2015)

    Google Scholar 

  17. Dimick, C.: Healthcare Still Unprepared for Cybersecurity Attacks. http://journal.ahima.org/2015/10/20/report-healthcare-still-unprepared-for-cybersecurity-attacks/. Accessed 07 Apr 2016

  18. Kovacs, E.: 1,400 Flaws Found in Outdated CareFusion Medical Systems. http://www.securityweek.com/1400-flaws-found-outdated-carefusion-medical-systems. Accessed 07 Apr 2016

  19. Fernando, J.: The elephant in the room: health information system security and the user-level environment. In: International Conference for Internet Technology and Secured Transactions (2009)

    Google Scholar 

  20. Mirkovic, J., Skipenes, E., Christiansen, E.K., Bryhni, H.: Security and privacy legislation guidelines for developing personal health records. In: Second International Conference on eDemocracy & eGovernment (2015)

    Google Scholar 

  21. Machanavajjhala, A., Kifer, D.: Designing statistical privacy for your data. Commun. ACM 58(3), 58–67 (2015)

    Article  Google Scholar 

  22. Popa, R.A., Zeldovich, N.: How to compute with data you can’t see. IEEE Spectr. 52(8), 42–47 (2015)

    Article  Google Scholar 

  23. Breebaart, J., Yang, B., Dulman, I., Busch, C.: Biometric template protection. Datenschutz und Datensicherheit-DuD 33(5), 29–304 (2009)

    Article  Google Scholar 

  24. Feigenbaum, J., Ford, B.: Seeking anonymity in an internet panopticon. Commun. ACM 58(10), 58–69 (2015)

    Article  Google Scholar 

  25. Guo, L., Zhang, C., Sun, J., Fang, Y.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially funded by the strategical funding from the Center for Cyber and Information Security (ccis.no) to support the research initiative on health and welfare security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bian Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Yang, B. (2016). What Make You Sure that Health Informatics Is Secure. In: Chang, C., Chiari, L., Cao, Y., Jin, H., Mokhtari, M., Aloulou, H. (eds) Inclusive Smart Cities and Digital Health. ICOST 2016. Lecture Notes in Computer Science(), vol 9677. Springer, Cham. https://doi.org/10.1007/978-3-319-39601-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39601-9_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39600-2

  • Online ISBN: 978-3-319-39601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics