Reference Hub9
A Threat Table Based Assessment of Information Security in Telemedicine

A Threat Table Based Assessment of Information Security in Telemedicine

John C. Pendergrass, Karen Heart, C. Ranganathan, V. N. Venkatakrishnan
Copyright: © 2014 |Volume: 9 |Issue: 4 |Pages: 12
ISSN: 1555-3396|EISSN: 1555-340X|EISBN13: 9781466654624|DOI: 10.4018/ijhisi.2014100102
Cite Article Cite Article

MLA

Pendergrass, John C., et al. "A Threat Table Based Assessment of Information Security in Telemedicine." IJHISI vol.9, no.4 2014: pp.20-31. http://doi.org/10.4018/ijhisi.2014100102

APA

Pendergrass, J. C., Heart, K., Ranganathan, C., & Venkatakrishnan, V. N. (2014). A Threat Table Based Assessment of Information Security in Telemedicine. International Journal of Healthcare Information Systems and Informatics (IJHISI), 9(4), 20-31. http://doi.org/10.4018/ijhisi.2014100102

Chicago

Pendergrass, John C., et al. "A Threat Table Based Assessment of Information Security in Telemedicine," International Journal of Healthcare Information Systems and Informatics (IJHISI) 9, no.4: 20-31. http://doi.org/10.4018/ijhisi.2014100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.