Reference Hub8
Development of an E-Healthcare Information Security Risk Assessment Method

Development of an E-Healthcare Information Security Risk Assessment Method

June Wei, Binshan Lin, Meiga Loho-Noya
Copyright: © 2013 |Volume: 24 |Issue: 1 |Pages: 22
ISSN: 1063-8016|EISSN: 1533-8010|EISBN13: 9781466630437|DOI: 10.4018/jdm.2013010103
Cite Article Cite Article

MLA

Wei, June, et al. "Development of an E-Healthcare Information Security Risk Assessment Method." JDM vol.24, no.1 2013: pp.36-57. http://doi.org/10.4018/jdm.2013010103

APA

Wei, J., Lin, B., & Loho-Noya, M. (2013). Development of an E-Healthcare Information Security Risk Assessment Method. Journal of Database Management (JDM), 24(1), 36-57. http://doi.org/10.4018/jdm.2013010103

Chicago

Wei, June, Binshan Lin, and Meiga Loho-Noya. "Development of an E-Healthcare Information Security Risk Assessment Method," Journal of Database Management (JDM) 24, no.1: 36-57. http://doi.org/10.4018/jdm.2013010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link these information risk factors in the EHISR model. Pattern analysis showed that information security risks could be classified into two levels, and versatility analysis showed that the overall security risks for eight information flows were close with a range from 55% to 86%. Third, one quantifiable approach based on a relative-weighted assessment model was developed to demonstrate how to assess the information security risks in e-healthcare. This quantitative security risk measurement establishes a reference point for assessing e-healthcare security risks and assists managers in selecting a reliable information flow infrastructure with a lower security risk level.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.