SlideShare a Scribd company logo
1 of 9
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
ISSN No: 2456
International Journal of Trend in Scientific
Research and
International Conference on Advanced Engineering
and Information Technology (ICAEIT
Electronic Healthcare Record Security
Management
Department of Library and
Hassan Usman
ABSTRACT
This study aim sat identifying
countermeasures used in protecting the Electronic
Healthcare Record and how employees
knowledge about the existence Electronic
Record security as well as countermeasures
mitigating the threats and data breaches
organizations. A case study of Aminu Kano
Hospital, Nigeria was used and qualitative research
method was adopted where purposive
random sampling was used. This led to
of eleven relevant questions to four categories
A conceptual frame work was proposed
study and the findings we reevaluated
proposed frame work. There sults revealed
is lack of knowledge sharing among employees and
some factors were found to be the resistance factors,
this include educational background, behavior,
security awareness, personality differences
of management commitment. On the
deterrent, preventive and organizational
partially practiced as countermeasures
mitigate the threats and vulnerability of
of Electronic Healthcare Records in
Teaching Hospital in Nigeria.
Keywords: Electronic Healthcare Records, Security
and Management, Countermeasures,
Sharing
1. INTRODUCTION
Nowadays, using information syst
healthcare environment provides m
benefits such as improving the quali
reducing medical errors, enhancing the
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Special Issue Publication
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Conference on Advanced Engineering
and Information Technology (ICAEIT-2017)
c Healthcare Record Security and
Management in Healthcare Organizations
Attahiru Saminu, CLN
and Information Science, College of Science and Technology
Usman Katsina Polytechnic Katsina State, Nigeria
the current
the Electronic
how employees share their
Electronic Healthcare
countermeasures used in
breaches in healthcare
Kano Teaching
qualitative research
and stratified
to construction
categories of staff.
proposed to quid the
reevaluated using the
revealed that there
employees and
be the resistance factors,
ckground, behavior, low
personality differences and lack
the other hand,
organizational actions were
countermeasures used to
of data breaches
Aminu Kano
Electronic Healthcare Records, Security
Countermeasures, Knowledge
tems in the
many potential
ality of care,
e readability,
availability and accessibility
However, Healthcare Inform
security threats have increase
years. For instance, during th
2007, over1, 5millionnames w
breaches that occurred in hosp
challenges differ from one cou
which includes lack of pati
inadequate healthcare policies,
global standards and pr
The common threats are com
computer viruses, Therefore, e
other countermeasures and oth
regulations include firewalls, a
detection, and control systems a
required levels of detail protecti
that the level of information
increase due to the present Trans
to Electronic
The best solution for this is b
healthcare employees with kn
security. Inanition, knowle
employees in healthcare or
challenging as their backgrou
differ. Moreover, organization
security will face numerous
other confidentiality and secur
to (2) organizations spend a l
ensure that their informati
protected from various ty
incompliance with applicable l
these efforts, security breach
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 136
Special Issue Publication
International Conference on Advanced Engineering
and
Organizations
Technology
y of information (1).
mation Systems (HIS)
ed significantly in recent
he period from 2006 to
were exposed during data
pitals alone. The security
ountry to another country
atient unique identifier,
licies, lack of full acceptable
privacy,
mputer crimes, hackers,
, enforcement required for
her security and privacy
, anti-virus, and intrusion,
s are no longer given the
tection. For this, (5) noted
n security threats might
Trans formation. Threats
by creating awareness to
nowledge of information
ledge sharing among
organization could be
round and domains may
ns with low level so fIS
of computer abuse and
urity threats, According
lot of money in order to
ation systems are both
ypes of attacks and
le laws. Despite all of
hes are still on the rise.
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 137
For example, (3) the study quoted a CERT
(Coordination Center Survey Report) which showed
that the number of reported security breaches by
various organizations in the United States of America
(USA) roseto137,529 in 2003 from 2,573 breaches
reported in 1996. The challenge grows due to the fact
that the types of threats change at the same pace with
which the technology advances (4).
Medical Records (EMR) could be classified into two
broad areas: (1) Organizational threats that started
from the improper access of patient records by either
internal agents misused their privileges or external
agents abuse their vulnerability of information
security systems, and (2) Systemic threats that occur
from an agent in the information flow stages
exploiting the disclosed data beyond its wanted use
(6).
Security incidents, so it is very important for the IT
organizations concerned to know what kinds of
security measures that are effective in protecting
information systems and data in their respective
organizations. This paper focuses on the
countermeasures that are used to help in mitigating
security challenges in Healthcare organizations.
1.1 Research Objectives
The main objective of this research his to propose a
frame work that can be used to improve Information
System Security in Healthcare organizations.
OTHER OBJECTIVES INCLUDE:
1.2 Research Questions
a. What are the problems of information
management in the investigated are a regarding
Information security?
b. How these problems can be solved to improve
information security?
THIS LED TO INVESTIGATE THE
FOLLOWING:
1. To identify the Information Security
countermeasures that healthcare organization use
to mitigate security threats.
2. To identify the ways employees share
knowledge about information security issues and
countermeasures.
3. To evaluate the effectiveness of information
Security countermeasures based on the
proposed frame work from AKTH perspective.
1. How information security countermeasures
mitigate the security threats of Electronic Medical
Records?
2. How employees do share knowledge about
information security countermeasures?
3. How information security countermeasures can be
improved to solve the problems?
1.3 Related work
(3) Defines security as the state of being secure or free
from danger and recognizes information security as
just one of the multiple layers of security required
among others like physical security, personnel
security, operations security, communications
security, and network security. (4) Describes
information security as protecting information and
information systems from unauthorized access, use,
disclosure, disruption, alteration, and destructions,.
All the above authors enumerate import ant
characteristics of information albeit With
variations.(5) List Confidentiality, Integrity, Utility
and Possession as the critical characteristics of
information while (4)recognizes what he calls Parker
Ian Hexed, which takes Confidentiality, Integrity, and
Availability, called CIA triangle (6)add Possession,
Authenticity, and Utility. Confidentiality is concerned
with the responsibilities of the custodian of other
people’s personal data as opposed to privacy which is
associated with a person’s control over his or her
personal data (7).
Information systems security can be categorized into
physical and technical securities. Information
Technology (IT) security can be computer and
communication system security. It is positioned
towards what the overall security requirements should
be. This part of the overall security is thus at an
organizational level and concerns the business sasa
whole (8).Computer Security concerns with the
protection of hard ware and its contents while
Communication Security includes the Protection of
networks and other information media that
communicate information among computers, In order
to provide a more understand able view of how these
characteristics and security measures relate to one
another, an information security model has been
created. The aim of the model is to describe what
information security represents. The model combines
the definitions and descriptions mentioned above.
Information Systems effectiveness has been
extensively studied over the past years because of its
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 138
importance in the field of Information Technology
(9). However, there is a lack of understanding and
knowledge on how security measures and
organizational factors can influence the level of
security effectiveness in Information Technology (IT)
organizations in the current literature (8)and(10)
suggested that information system security
administrators consider the following to improve the
Information System security level in their
organizations.
1. Information Technology (IT) organizations should
monitor and enforce policy and distribute
information about organizational guidelines for
acceptable system usage.
2. Environmental factors such as the tightness of the
security environment and visibility of the Security
administrators should be taken in to consideration
to reduce the number of computer abuse incidents
3. Information Technology (IT) organizations should
put it more effort in security issues by expanding
the staff hours on IS, security.
They further proposed a conceptual frame work for
effective information system security in Information
Technology (IT) organizations that includes:
Disincentives Certainty, Systems Environment
Security Control, Codes of Ethics, Software Security
Controls, Top Management Support and
Organizational Maturity were considered as
independent variables that have an impact on a
security effectiveness.
Many researchers agreed with the idea that the human
mind is composed of rational and emotional
components. A few authors state that security
behavior depends on a person’s attitude and beliefs.
Believe is cognitive information without an emotional
component, but the attitude is an evaluation or
emotional response (11). Some other author’s (12)
proposed the ABC Model where employee attitude to
information security issues is based on rational
component (cognition) emotional component (affect)
and behavior.
A. Emotional aspect of attitude for example, for
Example, feeling like grief, pain, fear, guilt,
B. Behavior component is derived from fact that our
behaviour also gives feedback to attitude
C. Cognitive or thoughtful aspect of attitude.
The implementation of health information technology
and electronic exchange of patients' information will
result in privacy violations and security breaches. For
information security, knowledge sharing is Significant
to make sure that the knowledge can be transfer
among employees, disseminate and distribute to make
it available to those who require it (13). Mean while
in (14), they have identified that knowledge gap and
flow as part of knowledge sharing among healthcare
providers analysis. (15) Adopted Nonaka's modes of
knowledge creation between tacit and explicit
knowledge to ensure that knowledge can be created
and disseminated. (13) Identified the key resistance
factors in knowledge sharing towards information
security culture in the healthcare organization. Some
key resistance factors highlighted are the lack of top
management commitment, behavior, lack of trust,
personality differences, and lack of communication,
low-security awareness, cultural differences, and
openness to experience.
There view of the literature has explored four (4)
main areas of information system security in
healthcare organization. This includes Information
Security System Model that work on two different
levels: system level and process level; the system
level contains the process of level tasks and it has
been included organizational Structure, process and
resources, This is designed to establish, monitor,
implement, operate, maintain and improve the
characteristic of information security by the
collaboration of different activities while the process
level concerned with the development,
implementation, planning, maintenance and
evaluation of the IT security.
The End User Security Behavior that composed of
rational and emotional components of human mine
where it employs attitude to information security
issues based on the emotional spect of attitude, for
example, Feeling like grief, pain, fear, guilt, the
behavior component that derived from the facto four
behavior also gives feed back to attitude and the
cognitive or thoughtful aspect of attitude.
The Knowledge Sharing in Information Security
Systems tries to ensure that the knowledge can be
transfer among employees, disseminate and distribute
to make it available to those whore quire it. This
identified the key resistance factors in knowledge
sharing towards information security culture in a
healthcare organization. Some key resistance factors
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 139
highlighted are the lack of top management
commitment, behavior, lack of trust, personality
differences, and lack of communication, low- security
awareness, cultural differences, and openness to
experience.
Finally, is the Information System Security in IT
Organization suggested that Information System
security administrators should consider the
Disincentives Certainty, Systems Environment
Security Control, Codes of Ethics, Software Security
Controls, Top Management Support and
Organizational Maturity to improve the Information
System security level in their organizations. In
recognition of that, healthcare organizations heavily
rely on generating patients’ data, therefore, these will.
Play a significant role to protect the information
generated and understand the effective information
security management in healthcare organizations. The
literature studied offers in sight in to those challenges
of information security and offers recommendations
that have the potential to be further articulated and
expanded to improve the security management in a
health care organization.
Base on the literature reviewed, a conceptual frame
work Information Systems Security (ICT-ISS Model)
is developed that mapped Disincentives Certainty,
Systems Environment Security Control, Codes of
Ethics, Software Security Controls, Top Management
Support, Organizational Maturity and Conceptual
Model of Knowledge Sharing in to a single
conceptual frame work for information security.
Figure 1 Information and Communication
Technology Information Security
System Model (ICT-ISS Model
2. Research Method
A qualitative study was conducted. “It seems Too
obvious that, the choice of the research method ought
to be determined by the nature of the research
problem”. (18), this is through an in-depth face-to-
face interview with a total of 10samples,ascomprising
of 2hospital personals representing both the system
providers (Information Technology Manager) and the
end-users (doctors, nurses, allied health personnel)
in the. Oto rhino laryn go logy (ENT) department of
AKTH .In addition, Information Technology Systems
applied in above named hospital is at different
stages of development and defers from one
department to another. Therefore, the description on
their departmental information system is based on the
stage of implementation and its functionalities
The interviews were conducted in February, 2016.
Purposive and stratified random sampling was used to
select the samples among the hospital staff that are
directly involving with the information system in the
hospital. Once the identified sample verbally
consented for the interview, an in-depth face-to face
interview was
The data obtained was sorted according to various
categories based on content analysis. Data
3. RESULTSAND DISCUSSION
Research question 1; how information security
counter measures mitigate the security threats of
Electronic Medical Records?
3.1 Deterrents actions
The literature suggested that deterrent action is
necessary in order to discourage an individual from
intentionally violating information security policies or
procedures (13). Deterrent action is all about
discouraging users from intentionally violating
information security procedures or policies like
computer security awareness, policy statements,
guidelines, minimum standards for personnel behavior
and organization personnel rules that may include
some conditions for the appropriate way of system
use, the main aspects of deterrent actions are:
There is a report that indicates that the employees of
Aminu Kano Teaching Hospital (AKTH) are misusing
EHR soft ware and at times in stalled illegal soft ware
for their personal used. However, no any punishment
or penalty attached to that misconduct. Furthermore,
there is no available IT staff to monitor and ensure the
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 140
server rooms are saved and secured every time and to
make sure that.
The current study, further, suggests that immediate
adoption of deterrent actions may have direct
significance to reduce the level of security threats.
This is by applying the key content so fit, by both
the IT engineers, medical staff and the top
management intern of providing computer security
awareness training, guidelines, policy statements and
a minimum setoff standards for personnel behavior
and Performed in their respective units, The samples
were introduced to the interviewer and were briefed
about the study purpose. The interview was conducted
using an identical guide questions to ensure similarity
of interviewing method and flow of
discussion Analysis was carried out by using N vivo
soft ware and mapping according to emerging themes.
1. Disincentives certainty that takes care of
punishment and penalties up on violating any rule
and this will discourage individuals from
violation of such laws
2. System environmental security refers to the
tightness on the visibility of the security
managers and security environment that may
reduce computer abuse
3. Codes of ethics are the rules and standards
governing the conduct of an employer with others
only authorized users are allowed to those server
rooms but unfortunately, everyone has access to those
server rooms.
By observations, AKTH has no any program at hand
that incorporated the IT employees with other
healthcare stakeholders. So actually, there is a gap
between IT staff and other employees with regards to
the security of EMR
Security in AKTH
Company personnel rules that contain specific
conditions for the accept able use of the system. The
findings are also consistent with the findings from
Information System Security Countermeasures
literature (18; 17) pointed the impact of deterrent
actions to healthcare organization throughout the
medical processes.
Figure 2 Shows response on Disincentive certainty
and system environment control
3.2 Prevention actions
Preventive Actions Currently IT security measures are
provided by both operating system and data base
management systems security software access control
Password control is used to prevent unauthorized
access and misuse of computers. For website security
purposes, the MIS unit has compiled a script in
UNIX.
Information System Security Counter measures are
necessary with the prevailing of Electronic Medical
Records threats. Preventive actions enable only
authorized users to access a computerized system (8).
Preventive coition allows access to a computerized
system by only authorized users. The main concerned
is on the software security controls that comprise
operating system security Software control, fourth
generation security software control, DBMS security
software control and specialized security software
control. Preventive action increases the level of
security effectiveness’s through the use of software
controls intended to inhibit free use of computing
resources
The study investigated four types of preventive
actions: the DBMS security software, fourth
generation security software, specialized security
software and operation system security software.
Where found the partial application of DBMS security
software and specialized security software by IT staff,
Doctors, and Management Staff, preventive actions is
a very important full application of it will provide
security to entire systems. The use of password will
enable only authorized users to have access to their
system but in AKTH employees have access to their
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 141
each other systems without out the use of any
personal password.
Figure 3 shows the rate of Prevention actions
3.3 Organizational actions
The organizational objectives are to maintained and
develop legal and high-quality services. The findings
of this case study revealed that when proper an a
gement activities are implemented they lead to the
intended objective of EMR security. Such activities
include top management support and organizational
maturity. Top management support indecision
making, monitoring security measures, encourages
employees to comply with security rules and
procedures. The mature organization is the one with
formalized business’s procedures and guidelines, high
use of performance measurements and availability of
decision-
This study suggests that top management commitment
may have the direct impact on the level of information
security measure. This can be achieved through top
management’s willingness to exert the required effort,
in terms of allocating the righter sources and making
decisions insecurity related issues. Furthermore, it is
also suggested that immediate manager’s commitment
to mature organization’s information security program
.In terms of consistency and enforcement of the rules
implemented, appeared to have a direct impact on the
top management’s commitment to the development
and deployment of the related data. The findings
related to the suggestion made in the literature as “it is
quite that mature organizations have proper guidelines
and code of ethics that will stress on the proper and
improper usage of information systems thus increase
the level of security effectiveness.”(13). It was
observed that AKTH management staff has neglected
the issue of EMR security control. However, there are
many incidences of security violations like free access
to computerized systems and many other offenses
committed by the employees but no any actions were
taken to ensure the security of such system. Even
though, some rules and procedures a rewritten but no
implementations and enforcement to the employees.
Organization’s Electronic Medical Record Security.
This is because of a good relationship between
managers and employees. These findings also are in
line with “Healthcare organization that aimed to apply
KM strategy and integrated with knowledge sharing
needs to focus more relationship between managers
and employee. These may help to improve the
organization’s current security knowledge and
requirements among healthcare practitioners in
cultivating information security culture.” (19)
Figure 4 shows the Organizational actions
3.4 Knowledge Sharing Towards Information
Security Culture in Aminu Kano Teaching
Hospital
The study suggests that there should be a proper
knowledge sharing of information security measures
and knowledge in terms of formal and informal that is
individual’s willingness to share. Moreover, there
were neither formal no informal mechanisms for
sharing information and knowledge with regards to
EMR security countermeasures and other related
issues between the IT staff and other AKTH
employees. Impact; there were no organizational
strategies in place to establish priorities for
Research question 1: How employees do shared
knowledge about Information Security
countermeasures?
Information and knowledge sharing issues or for how
it should be utilized. It was also observed that while a
little Informal sharing existed between management
and IT staff, the same time limited to medical staff.
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 142
The observation from this study also pointed some
factors that affect tproper Knowledge sharing with
regards to EMR security counter measures. For
Example, the study revealed that some members are
willing to share but due to some key resisting factors
they couldn’t do so among which are behavior,
educational background, personality differences and
lack of top management commitment. These findings
are also in line with (5) “The key resistance factors
identified are; Behavior, Lack of top management
commitment, lack of communication, low-security
awareness, personality differences, cultural
differences and lack of trust, openness to experience
Figure 5 Shows the comparison between there is and there is no knowledge sharing
In general, the findings obtained revealed that the
respondents are on the same view of Disincentive
certainty, System environment security control,
DBMS security software, Specialized security
software, Top management support, and
Organizational maturity are the countermeasures
widely used in Aminu Kano Teaching Hospital
(AKTH) as summarizedinTable1 below, similarly,
other countermeasures like code of ethics, Fourth
generation security software and Operation system
security software were neglected in Aminu Kano
Teaching Hospital (AKTH). The following matrix
table shows the key findings for each concept are
succinctly summarized. The summary indicated in the
below matrix table was compiled base on participant’s
data found that described the response rate of each
interviewe
VARIABLES RESPONDENTSRATE
Deterrents actions IT1 IT2 Doc1 Doc2 Nur1 Nur2 MGT1 MGT2
1 Disincentive certainty × ×
2 System environment security control × × ×
3 Code of ethics. × × × × × × × ×
Preventive actions
1 DBMS security software × × × × × ×
2 Fourth generation security software × × × × × × ×
3 Specialized security software × × × × × ×
4 Operation security system software × × × × × × × ×
Organizational actions
1 Top management support × ×
2 Organizational maturity × × × × × × ×
Source: concept matrix table. Colin’s, (2013)
Base on the above evaluation and comparison of the proposed frame work and the result found, a new
framework was analyzed (see Figure 6). The countermeasures found were a link to the knowledge
sharing that will lead to effective security of Electronic Medical Records in AKTH.
International Journal of Trend in Scientific Research and Deve
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
Figure 6 effective information securities through
knowledge sharing
The findings of the fund a mental resea
the empirical study provided an undispu
for supporting the information Syst
model introduced by this research. Both
the Effectiveness of Information Syst
mode land knowledge sharing model m
mainframe work were consolidated in o
work that could be Used to deploy
information security countermeasure, Mo
introduced frame work is a step toward
Effectiveness of Information Syste
countermeasures; As such the study
variety of theories from many aspects o
system security.
Figure 7 Evaluated ISS (ICT-ISS
4. Conclusions
The state of information security at
Teaching Hospital is beneath minim
required by international informat
standards and other dependable inform
organizations and authors. In effect
resource sat Aminu Kano Teaching H
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018
securities through
earch as well as
puted agreement
tems Security
th frame works,
stems Security
mapped in one
one main frame
y an effective
Moreover, the
ds a theory of
ems Security
y has drawn a
of information
Model)
Aminu Kano
mum standard
tion security
mation security
ect, information
g Hospital are
somewhat vulnerable. The
play san import ant role due t
and diversity of users and their
The main challenges to info
been identified as follows.
1. Lack of str
policies/strategies/framewo
management commitmen
information security measu
2. Law security awareness/kno
existence of information s
among employees
3. Inadequate qualified and IT skilled staff
Ineffective information sec
to tackle security threats
Records.
5. Recommendations
a. Provision of effecti
committed leadership, fu
policies, laws and guidelin
b. Immediate adoption of
reduce the level of securi
providing computer securi
term of providing compu
training for personnel and company
rules for the use of the systems
c. Except these issues are im
mitigated, the security o
Aminu Kano Teaching H
assured
d. Preventive actions is
application of it will pro
systems
e. Immediate manager’s commitment to mature
organization’s information security
Like consistency and en
Implemented,
REFERENCES
1. HIT&MIS: A statistical
Storage Security Breaches
l.: ACM, 2006.
2. Health Information Eng
(FHIES), Computer Scien
206.DongN, Jonker H, P
2012, Vols.7151, 195-206
3. Kok OM, BasogluN, D
Success Factors of Elec
System Adoption, Pro
lopment (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 143
healthcare environment
to its need for openness,
ir needs
formation security have
f strong
ork/standards Law top
ent towards effective
ures
nowledge sharing on the
security countermeasures
te qualified and IT skilled staff
ecurity countermeasures
ts to Electronic Medical
ive countermeasures,
ull awareness, standard,
ines
f deterrent actions may
rity threats. In term of
rity awareness training In
puter security awareness
and company personnel
the systems.
re immediately consignor
of information assets at
g Hospital can never be
s is very important full
ovide security to entire
iate manager’s commitment to mature
’s information security program.
nforcement of the rules
Analysis of Disclosed
rity Breaches. G, Goldschmidt P. s.
ngineering and Systems
nce, 2012, 7151, p195-
Pang J. s. l.: USENIX,
6.
Daim, T. Exploring the
ectronic Health Record
oceedingsofPICMET’12:
International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647
@ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 144
Technology Management For Emerging
Technologies, Turkey: Bogazici University, 2012.
4. Kruger H&KearneyW. A prototype for
assessing information security, Computers
andSecurity,.2006.
5. A Conceptual Model for Knowledge Sharing To
wads Information Security Culture in Healthcare
Organization, Hassan, etal, (2013), 2013, IEEE 3rd
International conference on research and
innovation systems (ICRIIS'13), 5,
6. Investigating Barriers to Electronic Medical
Record Use during Collaborative Information
Seeking Activities. KarunakaranA, YoungHN,
MadhuR. s. l.: The 2nd ACM SIGHIT
International Health Informatics Symposium,
2012, Vols.p.743-748.
7. A prototype for assessing information security.
Martin &Kruger H&KearneyW.2006,
Computers and Security,, Vol.25($),pp.289-296.
8. The Basics of Information Security:
Understanding the Fundamentals of Information
Security in Theory and Practice. Andress.2011, us
a. eLSEVIER.
9. Principles of Information Security:. Wihitman&
Mattord. 2005, Course Technology. Boston.
10. ‘Privacy: Aspects, definitions and a multi-faceted
privacy. Renaud& Galvez-Cruz.2010,
Information Security for Sourth Africa,, pp.1-8.
11. Wallin. Managing Information Security in
Healthcare: A Case Study in Region, Skåne,
Master Thesis,. 2008, pp.11-12.
12. "Introduction to computers and information"
.Wise & Athey.2003, IEEE Journal, 309-315.,pp.
309-315.
13. Effective of Information Systems Security in IT
Organizations in Malaysia. Al-Salihy. Malaysia:
s. n., 2003.9thAsia Pasific Conference on
Communications APCC, 5.
14. Kabay, M.E. Using social psychology to
implement security policies, Computer Security. s.
l.: Handbook.
www.mekabay.com/infosecmgmt/SocPsychINFO
SEC pdf, 2002.
15. Cultivating an organizational information security
culture. Tipton, H. F. & Krause M. s.l.:
Computer Fraud &Securiyty,7-11.,2006,Computer
Fraud& Security,, Pp.7-11.
16. “Knowledge Management Barriers: An
Interpretive Structural Modeling Approach”. M.
D. Singh and R. Kant. 2007. IEEEInt.
Conference in Industrial Engineering and
Engineering.
17. Lupiana.“Development of A Frame work To
Leverage Knowledge Management Systems to
Improve Security Awareness”. s. l.: Dublin:
Dublin Institute of Technology. 2008.
18. Librarians, Professionalism and Image: Stereotype
and Reality, Library. Luthmann, Abigail.9, 2007,
Review, Vol.56, p.775.

More Related Content

What's hot

Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsIOSR Journals
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - editedNelson Kimathi
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Case Study
Case StudyCase Study
Case Studylneut03
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_HillDennis Hill
 

What's hot (19)

Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
J1803045759
J1803045759J1803045759
J1803045759
 
E1804012536
E1804012536E1804012536
E1804012536
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Case Study
Case StudyCase Study
Case Study
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 

Similar to Electronic Healthcare Record Security Management

Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security ControlsThomas Jones
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...IJCNCJournal
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...Angie Miller
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxflorriezhamphrey3065
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Managementijitcs
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsCSCJournals
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance frameworkAnne ndolo
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inSusanaFurman449
 

Similar to Electronic Healthcare Record Security Management (20)

Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred in
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Electronic Healthcare Record Security Management

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 ISSN No: 2456 International Journal of Trend in Scientific Research and International Conference on Advanced Engineering and Information Technology (ICAEIT Electronic Healthcare Record Security Management Department of Library and Hassan Usman ABSTRACT This study aim sat identifying countermeasures used in protecting the Electronic Healthcare Record and how employees knowledge about the existence Electronic Record security as well as countermeasures mitigating the threats and data breaches organizations. A case study of Aminu Kano Hospital, Nigeria was used and qualitative research method was adopted where purposive random sampling was used. This led to of eleven relevant questions to four categories A conceptual frame work was proposed study and the findings we reevaluated proposed frame work. There sults revealed is lack of knowledge sharing among employees and some factors were found to be the resistance factors, this include educational background, behavior, security awareness, personality differences of management commitment. On the deterrent, preventive and organizational partially practiced as countermeasures mitigate the threats and vulnerability of of Electronic Healthcare Records in Teaching Hospital in Nigeria. Keywords: Electronic Healthcare Records, Security and Management, Countermeasures, Sharing 1. INTRODUCTION Nowadays, using information syst healthcare environment provides m benefits such as improving the quali reducing medical errors, enhancing the @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Special Issue Publication International Journal of Trend in Scientific Research and Development (IJTSRD) International Conference on Advanced Engineering and Information Technology (ICAEIT-2017) c Healthcare Record Security and Management in Healthcare Organizations Attahiru Saminu, CLN and Information Science, College of Science and Technology Usman Katsina Polytechnic Katsina State, Nigeria the current the Electronic how employees share their Electronic Healthcare countermeasures used in breaches in healthcare Kano Teaching qualitative research and stratified to construction categories of staff. proposed to quid the reevaluated using the revealed that there employees and be the resistance factors, ckground, behavior, low personality differences and lack the other hand, organizational actions were countermeasures used to of data breaches Aminu Kano Electronic Healthcare Records, Security Countermeasures, Knowledge tems in the many potential ality of care, e readability, availability and accessibility However, Healthcare Inform security threats have increase years. For instance, during th 2007, over1, 5millionnames w breaches that occurred in hosp challenges differ from one cou which includes lack of pati inadequate healthcare policies, global standards and pr The common threats are com computer viruses, Therefore, e other countermeasures and oth regulations include firewalls, a detection, and control systems a required levels of detail protecti that the level of information increase due to the present Trans to Electronic The best solution for this is b healthcare employees with kn security. Inanition, knowle employees in healthcare or challenging as their backgrou differ. Moreover, organization security will face numerous other confidentiality and secur to (2) organizations spend a l ensure that their informati protected from various ty incompliance with applicable l these efforts, security breach @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 136 Special Issue Publication International Conference on Advanced Engineering and Organizations Technology y of information (1). mation Systems (HIS) ed significantly in recent he period from 2006 to were exposed during data pitals alone. The security ountry to another country atient unique identifier, licies, lack of full acceptable privacy, mputer crimes, hackers, , enforcement required for her security and privacy , anti-virus, and intrusion, s are no longer given the tection. For this, (5) noted n security threats might Trans formation. Threats by creating awareness to nowledge of information ledge sharing among organization could be round and domains may ns with low level so fIS of computer abuse and urity threats, According lot of money in order to ation systems are both ypes of attacks and le laws. Despite all of hes are still on the rise.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 137 For example, (3) the study quoted a CERT (Coordination Center Survey Report) which showed that the number of reported security breaches by various organizations in the United States of America (USA) roseto137,529 in 2003 from 2,573 breaches reported in 1996. The challenge grows due to the fact that the types of threats change at the same pace with which the technology advances (4). Medical Records (EMR) could be classified into two broad areas: (1) Organizational threats that started from the improper access of patient records by either internal agents misused their privileges or external agents abuse their vulnerability of information security systems, and (2) Systemic threats that occur from an agent in the information flow stages exploiting the disclosed data beyond its wanted use (6). Security incidents, so it is very important for the IT organizations concerned to know what kinds of security measures that are effective in protecting information systems and data in their respective organizations. This paper focuses on the countermeasures that are used to help in mitigating security challenges in Healthcare organizations. 1.1 Research Objectives The main objective of this research his to propose a frame work that can be used to improve Information System Security in Healthcare organizations. OTHER OBJECTIVES INCLUDE: 1.2 Research Questions a. What are the problems of information management in the investigated are a regarding Information security? b. How these problems can be solved to improve information security? THIS LED TO INVESTIGATE THE FOLLOWING: 1. To identify the Information Security countermeasures that healthcare organization use to mitigate security threats. 2. To identify the ways employees share knowledge about information security issues and countermeasures. 3. To evaluate the effectiveness of information Security countermeasures based on the proposed frame work from AKTH perspective. 1. How information security countermeasures mitigate the security threats of Electronic Medical Records? 2. How employees do share knowledge about information security countermeasures? 3. How information security countermeasures can be improved to solve the problems? 1.3 Related work (3) Defines security as the state of being secure or free from danger and recognizes information security as just one of the multiple layers of security required among others like physical security, personnel security, operations security, communications security, and network security. (4) Describes information security as protecting information and information systems from unauthorized access, use, disclosure, disruption, alteration, and destructions,. All the above authors enumerate import ant characteristics of information albeit With variations.(5) List Confidentiality, Integrity, Utility and Possession as the critical characteristics of information while (4)recognizes what he calls Parker Ian Hexed, which takes Confidentiality, Integrity, and Availability, called CIA triangle (6)add Possession, Authenticity, and Utility. Confidentiality is concerned with the responsibilities of the custodian of other people’s personal data as opposed to privacy which is associated with a person’s control over his or her personal data (7). Information systems security can be categorized into physical and technical securities. Information Technology (IT) security can be computer and communication system security. It is positioned towards what the overall security requirements should be. This part of the overall security is thus at an organizational level and concerns the business sasa whole (8).Computer Security concerns with the protection of hard ware and its contents while Communication Security includes the Protection of networks and other information media that communicate information among computers, In order to provide a more understand able view of how these characteristics and security measures relate to one another, an information security model has been created. The aim of the model is to describe what information security represents. The model combines the definitions and descriptions mentioned above. Information Systems effectiveness has been extensively studied over the past years because of its
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 138 importance in the field of Information Technology (9). However, there is a lack of understanding and knowledge on how security measures and organizational factors can influence the level of security effectiveness in Information Technology (IT) organizations in the current literature (8)and(10) suggested that information system security administrators consider the following to improve the Information System security level in their organizations. 1. Information Technology (IT) organizations should monitor and enforce policy and distribute information about organizational guidelines for acceptable system usage. 2. Environmental factors such as the tightness of the security environment and visibility of the Security administrators should be taken in to consideration to reduce the number of computer abuse incidents 3. Information Technology (IT) organizations should put it more effort in security issues by expanding the staff hours on IS, security. They further proposed a conceptual frame work for effective information system security in Information Technology (IT) organizations that includes: Disincentives Certainty, Systems Environment Security Control, Codes of Ethics, Software Security Controls, Top Management Support and Organizational Maturity were considered as independent variables that have an impact on a security effectiveness. Many researchers agreed with the idea that the human mind is composed of rational and emotional components. A few authors state that security behavior depends on a person’s attitude and beliefs. Believe is cognitive information without an emotional component, but the attitude is an evaluation or emotional response (11). Some other author’s (12) proposed the ABC Model where employee attitude to information security issues is based on rational component (cognition) emotional component (affect) and behavior. A. Emotional aspect of attitude for example, for Example, feeling like grief, pain, fear, guilt, B. Behavior component is derived from fact that our behaviour also gives feedback to attitude C. Cognitive or thoughtful aspect of attitude. The implementation of health information technology and electronic exchange of patients' information will result in privacy violations and security breaches. For information security, knowledge sharing is Significant to make sure that the knowledge can be transfer among employees, disseminate and distribute to make it available to those who require it (13). Mean while in (14), they have identified that knowledge gap and flow as part of knowledge sharing among healthcare providers analysis. (15) Adopted Nonaka's modes of knowledge creation between tacit and explicit knowledge to ensure that knowledge can be created and disseminated. (13) Identified the key resistance factors in knowledge sharing towards information security culture in the healthcare organization. Some key resistance factors highlighted are the lack of top management commitment, behavior, lack of trust, personality differences, and lack of communication, low-security awareness, cultural differences, and openness to experience. There view of the literature has explored four (4) main areas of information system security in healthcare organization. This includes Information Security System Model that work on two different levels: system level and process level; the system level contains the process of level tasks and it has been included organizational Structure, process and resources, This is designed to establish, monitor, implement, operate, maintain and improve the characteristic of information security by the collaboration of different activities while the process level concerned with the development, implementation, planning, maintenance and evaluation of the IT security. The End User Security Behavior that composed of rational and emotional components of human mine where it employs attitude to information security issues based on the emotional spect of attitude, for example, Feeling like grief, pain, fear, guilt, the behavior component that derived from the facto four behavior also gives feed back to attitude and the cognitive or thoughtful aspect of attitude. The Knowledge Sharing in Information Security Systems tries to ensure that the knowledge can be transfer among employees, disseminate and distribute to make it available to those whore quire it. This identified the key resistance factors in knowledge sharing towards information security culture in a healthcare organization. Some key resistance factors
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 139 highlighted are the lack of top management commitment, behavior, lack of trust, personality differences, and lack of communication, low- security awareness, cultural differences, and openness to experience. Finally, is the Information System Security in IT Organization suggested that Information System security administrators should consider the Disincentives Certainty, Systems Environment Security Control, Codes of Ethics, Software Security Controls, Top Management Support and Organizational Maturity to improve the Information System security level in their organizations. In recognition of that, healthcare organizations heavily rely on generating patients’ data, therefore, these will. Play a significant role to protect the information generated and understand the effective information security management in healthcare organizations. The literature studied offers in sight in to those challenges of information security and offers recommendations that have the potential to be further articulated and expanded to improve the security management in a health care organization. Base on the literature reviewed, a conceptual frame work Information Systems Security (ICT-ISS Model) is developed that mapped Disincentives Certainty, Systems Environment Security Control, Codes of Ethics, Software Security Controls, Top Management Support, Organizational Maturity and Conceptual Model of Knowledge Sharing in to a single conceptual frame work for information security. Figure 1 Information and Communication Technology Information Security System Model (ICT-ISS Model 2. Research Method A qualitative study was conducted. “It seems Too obvious that, the choice of the research method ought to be determined by the nature of the research problem”. (18), this is through an in-depth face-to- face interview with a total of 10samples,ascomprising of 2hospital personals representing both the system providers (Information Technology Manager) and the end-users (doctors, nurses, allied health personnel) in the. Oto rhino laryn go logy (ENT) department of AKTH .In addition, Information Technology Systems applied in above named hospital is at different stages of development and defers from one department to another. Therefore, the description on their departmental information system is based on the stage of implementation and its functionalities The interviews were conducted in February, 2016. Purposive and stratified random sampling was used to select the samples among the hospital staff that are directly involving with the information system in the hospital. Once the identified sample verbally consented for the interview, an in-depth face-to face interview was The data obtained was sorted according to various categories based on content analysis. Data 3. RESULTSAND DISCUSSION Research question 1; how information security counter measures mitigate the security threats of Electronic Medical Records? 3.1 Deterrents actions The literature suggested that deterrent action is necessary in order to discourage an individual from intentionally violating information security policies or procedures (13). Deterrent action is all about discouraging users from intentionally violating information security procedures or policies like computer security awareness, policy statements, guidelines, minimum standards for personnel behavior and organization personnel rules that may include some conditions for the appropriate way of system use, the main aspects of deterrent actions are: There is a report that indicates that the employees of Aminu Kano Teaching Hospital (AKTH) are misusing EHR soft ware and at times in stalled illegal soft ware for their personal used. However, no any punishment or penalty attached to that misconduct. Furthermore, there is no available IT staff to monitor and ensure the
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 140 server rooms are saved and secured every time and to make sure that. The current study, further, suggests that immediate adoption of deterrent actions may have direct significance to reduce the level of security threats. This is by applying the key content so fit, by both the IT engineers, medical staff and the top management intern of providing computer security awareness training, guidelines, policy statements and a minimum setoff standards for personnel behavior and Performed in their respective units, The samples were introduced to the interviewer and were briefed about the study purpose. The interview was conducted using an identical guide questions to ensure similarity of interviewing method and flow of discussion Analysis was carried out by using N vivo soft ware and mapping according to emerging themes. 1. Disincentives certainty that takes care of punishment and penalties up on violating any rule and this will discourage individuals from violation of such laws 2. System environmental security refers to the tightness on the visibility of the security managers and security environment that may reduce computer abuse 3. Codes of ethics are the rules and standards governing the conduct of an employer with others only authorized users are allowed to those server rooms but unfortunately, everyone has access to those server rooms. By observations, AKTH has no any program at hand that incorporated the IT employees with other healthcare stakeholders. So actually, there is a gap between IT staff and other employees with regards to the security of EMR Security in AKTH Company personnel rules that contain specific conditions for the accept able use of the system. The findings are also consistent with the findings from Information System Security Countermeasures literature (18; 17) pointed the impact of deterrent actions to healthcare organization throughout the medical processes. Figure 2 Shows response on Disincentive certainty and system environment control 3.2 Prevention actions Preventive Actions Currently IT security measures are provided by both operating system and data base management systems security software access control Password control is used to prevent unauthorized access and misuse of computers. For website security purposes, the MIS unit has compiled a script in UNIX. Information System Security Counter measures are necessary with the prevailing of Electronic Medical Records threats. Preventive actions enable only authorized users to access a computerized system (8). Preventive coition allows access to a computerized system by only authorized users. The main concerned is on the software security controls that comprise operating system security Software control, fourth generation security software control, DBMS security software control and specialized security software control. Preventive action increases the level of security effectiveness’s through the use of software controls intended to inhibit free use of computing resources The study investigated four types of preventive actions: the DBMS security software, fourth generation security software, specialized security software and operation system security software. Where found the partial application of DBMS security software and specialized security software by IT staff, Doctors, and Management Staff, preventive actions is a very important full application of it will provide security to entire systems. The use of password will enable only authorized users to have access to their system but in AKTH employees have access to their
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 141 each other systems without out the use of any personal password. Figure 3 shows the rate of Prevention actions 3.3 Organizational actions The organizational objectives are to maintained and develop legal and high-quality services. The findings of this case study revealed that when proper an a gement activities are implemented they lead to the intended objective of EMR security. Such activities include top management support and organizational maturity. Top management support indecision making, monitoring security measures, encourages employees to comply with security rules and procedures. The mature organization is the one with formalized business’s procedures and guidelines, high use of performance measurements and availability of decision- This study suggests that top management commitment may have the direct impact on the level of information security measure. This can be achieved through top management’s willingness to exert the required effort, in terms of allocating the righter sources and making decisions insecurity related issues. Furthermore, it is also suggested that immediate manager’s commitment to mature organization’s information security program .In terms of consistency and enforcement of the rules implemented, appeared to have a direct impact on the top management’s commitment to the development and deployment of the related data. The findings related to the suggestion made in the literature as “it is quite that mature organizations have proper guidelines and code of ethics that will stress on the proper and improper usage of information systems thus increase the level of security effectiveness.”(13). It was observed that AKTH management staff has neglected the issue of EMR security control. However, there are many incidences of security violations like free access to computerized systems and many other offenses committed by the employees but no any actions were taken to ensure the security of such system. Even though, some rules and procedures a rewritten but no implementations and enforcement to the employees. Organization’s Electronic Medical Record Security. This is because of a good relationship between managers and employees. These findings also are in line with “Healthcare organization that aimed to apply KM strategy and integrated with knowledge sharing needs to focus more relationship between managers and employee. These may help to improve the organization’s current security knowledge and requirements among healthcare practitioners in cultivating information security culture.” (19) Figure 4 shows the Organizational actions 3.4 Knowledge Sharing Towards Information Security Culture in Aminu Kano Teaching Hospital The study suggests that there should be a proper knowledge sharing of information security measures and knowledge in terms of formal and informal that is individual’s willingness to share. Moreover, there were neither formal no informal mechanisms for sharing information and knowledge with regards to EMR security countermeasures and other related issues between the IT staff and other AKTH employees. Impact; there were no organizational strategies in place to establish priorities for Research question 1: How employees do shared knowledge about Information Security countermeasures? Information and knowledge sharing issues or for how it should be utilized. It was also observed that while a little Informal sharing existed between management and IT staff, the same time limited to medical staff.
  • 7. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 142 The observation from this study also pointed some factors that affect tproper Knowledge sharing with regards to EMR security counter measures. For Example, the study revealed that some members are willing to share but due to some key resisting factors they couldn’t do so among which are behavior, educational background, personality differences and lack of top management commitment. These findings are also in line with (5) “The key resistance factors identified are; Behavior, Lack of top management commitment, lack of communication, low-security awareness, personality differences, cultural differences and lack of trust, openness to experience Figure 5 Shows the comparison between there is and there is no knowledge sharing In general, the findings obtained revealed that the respondents are on the same view of Disincentive certainty, System environment security control, DBMS security software, Specialized security software, Top management support, and Organizational maturity are the countermeasures widely used in Aminu Kano Teaching Hospital (AKTH) as summarizedinTable1 below, similarly, other countermeasures like code of ethics, Fourth generation security software and Operation system security software were neglected in Aminu Kano Teaching Hospital (AKTH). The following matrix table shows the key findings for each concept are succinctly summarized. The summary indicated in the below matrix table was compiled base on participant’s data found that described the response rate of each interviewe VARIABLES RESPONDENTSRATE Deterrents actions IT1 IT2 Doc1 Doc2 Nur1 Nur2 MGT1 MGT2 1 Disincentive certainty × × 2 System environment security control × × × 3 Code of ethics. × × × × × × × × Preventive actions 1 DBMS security software × × × × × × 2 Fourth generation security software × × × × × × × 3 Specialized security software × × × × × × 4 Operation security system software × × × × × × × × Organizational actions 1 Top management support × × 2 Organizational maturity × × × × × × × Source: concept matrix table. Colin’s, (2013) Base on the above evaluation and comparison of the proposed frame work and the result found, a new framework was analyzed (see Figure 6). The countermeasures found were a link to the knowledge sharing that will lead to effective security of Electronic Medical Records in AKTH.
  • 8. International Journal of Trend in Scientific Research and Deve @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 Figure 6 effective information securities through knowledge sharing The findings of the fund a mental resea the empirical study provided an undispu for supporting the information Syst model introduced by this research. Both the Effectiveness of Information Syst mode land knowledge sharing model m mainframe work were consolidated in o work that could be Used to deploy information security countermeasure, Mo introduced frame work is a step toward Effectiveness of Information Syste countermeasures; As such the study variety of theories from many aspects o system security. Figure 7 Evaluated ISS (ICT-ISS 4. Conclusions The state of information security at Teaching Hospital is beneath minim required by international informat standards and other dependable inform organizations and authors. In effect resource sat Aminu Kano Teaching H International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 securities through earch as well as puted agreement tems Security th frame works, stems Security mapped in one one main frame y an effective Moreover, the ds a theory of ems Security y has drawn a of information Model) Aminu Kano mum standard tion security mation security ect, information g Hospital are somewhat vulnerable. The play san import ant role due t and diversity of users and their The main challenges to info been identified as follows. 1. Lack of str policies/strategies/framewo management commitmen information security measu 2. Law security awareness/kno existence of information s among employees 3. Inadequate qualified and IT skilled staff Ineffective information sec to tackle security threats Records. 5. Recommendations a. Provision of effecti committed leadership, fu policies, laws and guidelin b. Immediate adoption of reduce the level of securi providing computer securi term of providing compu training for personnel and company rules for the use of the systems c. Except these issues are im mitigated, the security o Aminu Kano Teaching H assured d. Preventive actions is application of it will pro systems e. Immediate manager’s commitment to mature organization’s information security Like consistency and en Implemented, REFERENCES 1. HIT&MIS: A statistical Storage Security Breaches l.: ACM, 2006. 2. Health Information Eng (FHIES), Computer Scien 206.DongN, Jonker H, P 2012, Vols.7151, 195-206 3. Kok OM, BasogluN, D Success Factors of Elec System Adoption, Pro lopment (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 143 healthcare environment to its need for openness, ir needs formation security have f strong ork/standards Law top ent towards effective ures nowledge sharing on the security countermeasures te qualified and IT skilled staff ecurity countermeasures ts to Electronic Medical ive countermeasures, ull awareness, standard, ines f deterrent actions may rity threats. In term of rity awareness training In puter security awareness and company personnel the systems. re immediately consignor of information assets at g Hospital can never be s is very important full ovide security to entire iate manager’s commitment to mature ’s information security program. nforcement of the rules Analysis of Disclosed rity Breaches. G, Goldschmidt P. s. ngineering and Systems nce, 2012, 7151, p195- Pang J. s. l.: USENIX, 6. Daim, T. Exploring the ectronic Health Record oceedingsofPICMET’12:
  • 9. International Journal of Trend in Scientific Research and Development (IJTSRD) | ISSN: 2456-647 @ IJTSRD | Available Online @ www.ijtsrd.com | Special Issue Publication | November 2018 P - 144 Technology Management For Emerging Technologies, Turkey: Bogazici University, 2012. 4. Kruger H&KearneyW. A prototype for assessing information security, Computers andSecurity,.2006. 5. A Conceptual Model for Knowledge Sharing To wads Information Security Culture in Healthcare Organization, Hassan, etal, (2013), 2013, IEEE 3rd International conference on research and innovation systems (ICRIIS'13), 5, 6. Investigating Barriers to Electronic Medical Record Use during Collaborative Information Seeking Activities. KarunakaranA, YoungHN, MadhuR. s. l.: The 2nd ACM SIGHIT International Health Informatics Symposium, 2012, Vols.p.743-748. 7. A prototype for assessing information security. Martin &Kruger H&KearneyW.2006, Computers and Security,, Vol.25($),pp.289-296. 8. The Basics of Information Security: Understanding the Fundamentals of Information Security in Theory and Practice. Andress.2011, us a. eLSEVIER. 9. Principles of Information Security:. Wihitman& Mattord. 2005, Course Technology. Boston. 10. ‘Privacy: Aspects, definitions and a multi-faceted privacy. Renaud& Galvez-Cruz.2010, Information Security for Sourth Africa,, pp.1-8. 11. Wallin. Managing Information Security in Healthcare: A Case Study in Region, Skåne, Master Thesis,. 2008, pp.11-12. 12. "Introduction to computers and information" .Wise & Athey.2003, IEEE Journal, 309-315.,pp. 309-315. 13. Effective of Information Systems Security in IT Organizations in Malaysia. Al-Salihy. Malaysia: s. n., 2003.9thAsia Pasific Conference on Communications APCC, 5. 14. Kabay, M.E. Using social psychology to implement security policies, Computer Security. s. l.: Handbook. www.mekabay.com/infosecmgmt/SocPsychINFO SEC pdf, 2002. 15. Cultivating an organizational information security culture. Tipton, H. F. & Krause M. s.l.: Computer Fraud &Securiyty,7-11.,2006,Computer Fraud& Security,, Pp.7-11. 16. “Knowledge Management Barriers: An Interpretive Structural Modeling Approach”. M. D. Singh and R. Kant. 2007. IEEEInt. Conference in Industrial Engineering and Engineering. 17. Lupiana.“Development of A Frame work To Leverage Knowledge Management Systems to Improve Security Awareness”. s. l.: Dublin: Dublin Institute of Technology. 2008. 18. Librarians, Professionalism and Image: Stereotype and Reality, Library. Luthmann, Abigail.9, 2007, Review, Vol.56, p.775.