A Comparative Assessment of Threat Identification Methods in EHR Systems (original) (raw)
Related papers
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
2009 Fifth International Conference on Information Assurance and Security, 2009
Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices
Recent Trends in Intensive Computing
AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium, 2011
Grounding information security in healthcare
International Journal of Medical Informatics, 2010
A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation
arXiv (Cornell University), 2020
Explaining accesses to electronic health records
Proceedings of the 2011 workshop on Data mining for medicine and healthcare, 2011
A red-flag-based approach to risk management of EHR-related safety concerns
Journal of healthcare risk management : the journal of the American Society for Healthcare Risk Management, 2013
EHR Anonymising System Based on the ISO/EN 13606 Norm
IFMBE Proceedings, 2014
Main Barriers for Quality Data Collection in Ehr
2011
De-Identification of Electronic Health Records Data
Advances in Intelligent Systems and Computing
Interoperable EHR Systems - Challenges, Standards and Solutions
European Journal for Biomedical Informatics, 2018
Participation in EHR based simulation improves recognition of patient safety issues
BMC Medical Education, 2014
A Flexible Solution for Privilege Management and Access Control in EHR Systems
European Journal for Biomedical Informatics, 2017
Risk management based early warning system for healthcare industry
2013 International Conference on Computer Medical Applications (ICCMA), 2013
2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015
E-Health Threat Intelligence Within Cyber-Defence Framework for E-Health Organizations
Advanced information and knowledge processing, 2021
Security requirements and solutions in distributed Electronic Health Records
Springer eBooks, 1997
COVID-19 and the effectiveness of ERM frameworks
British Actuarial Journal
Data Management in the EHDI System
The Volta Review, 2011
Healthcare cybersecurity and cybercrime supply chain risk management
Health Economics and Management Review, 2023
Measuring hazard identification
2006
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Electronic Health Records (EHR) Implementation and Post Implementation Challenges
clcloud.com
Health care is the new battlefront for anti-DEI attacks
PLOS global public health, 2024
Characteristics of IS Security Approaches with Respect to Healthcare
2009
Evaluation of the Electronic Medical Record for Emergencies (EMR-E) platform
F1000Research, 2016
Towards a Human Security-Based Early Warning and Response System
Hexagon Series on Human and Environmental Security and Peace, 2009
Procedia Computer Science, 2019
Identifying Personal Health Information Using Support Vector Machines
2006
A comprehensive EHR timeseries pre-training benchmark
Proceedings of the Conference on Health, Inference, and Learning
Vulnerability-threats assessment for enterprise network
Analysis of EHR-related Patient Safety Concerns
Towards event sequence representation, reasoning and visualization for EHR data
Proceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12, 2012
Electronic Health Records Information Security Dynamics for EHR Projects