Use of security patterns for development of secure healthcare information system
Healthcare systems have recently received attention from industry related to the sensitive and confidential information stored in it. This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in m...
| Main Authors: | Maher, Zulfikar Ahmed, Mohd Sani, Nor Fazlida, Din, Jamilah, A. Jabar, Marzanah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publishers
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/53208/ http://psasir.upm.edu.my/id/eprint/53208/1/Use%20of%20security%20patterns%20for%20development%20of%20secure%20healthcare%20information%20system.pdf |
Similar Items
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things
by: Premylla, Jeremiah, et al.
Published: (2018)
by: Premylla, Jeremiah, et al.
Published: (2018)
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Developing and evaluating interventions for women firesetters in high secure mental healthcare
by: Annesley, Phyllis, et al.
Published: (2017)
by: Annesley, Phyllis, et al.
Published: (2017)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
An approach to secure EPUB ebook content
by: Faniband, Yunus Parvej, et al.
Published: (2019)
by: Faniband, Yunus Parvej, et al.
Published: (2019)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Security issues of wireless sensor networks in healthcare applications
by: Ng, H. S., et al.
Published: (2006)
by: Ng, H. S., et al.
Published: (2006)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Adopting Theories-Based Model Of Information Security Compliance Behaviour For Healthcare Employees In Kingdom Of Saudi Arabia
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)
by: Abdullah, Norhayati
Published: (2001)
A cloud-based distributed platform for secured EPUB EBOOK contents
by: Faniband, Yunus Parvej, et al.
Published: (2020)
by: Faniband, Yunus Parvej, et al.
Published: (2020)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
Information security culture concept towards information security compliance: A comparison between it and non-it professionals
by: Akhyari, Nasir, et al.
Published: (2022)
by: Akhyari, Nasir, et al.
Published: (2022)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
E-Government - an information security perspective
by: Hassan, Rasha G., et al.
Published: (2016)
by: Hassan, Rasha G., et al.
Published: (2016)
Similar Items
-
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016) -
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018) -
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011) -
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012) -
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)