Kapoor et al., 2013 - Google Patents
Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical recordsKapoor et al., 2013
- Document ID
- 3925286847067962890
- Author
- Kapoor A
- Nazareth D
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
Breaches involving private consumer data are gaining more attention with the increasing push towards electronic records, and the demand for freer access to data. In the medical field, these breaches assume greater significance as they involve private data, and are …
- 230000001105 regulatory 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wikina | What caused the breach? An examination of use of information technology and health data breaches | |
Khansa et al. | Assessing innovations in cloud security | |
Sumner | Information security threats: a comparative analysis of impact, probability, and preparedness | |
Chuma et al. | Security of electronic personal health information in a public hospital in South Africa | |
Schunter | Intel software guard extensions: Introduction and open research challenges | |
Hintzbergen et al. | Foundations of Information Security Based on ISO27001 and ISO27002 | |
Farrell | Securing the cloud—governance, risk, and compliance issues reign supreme | |
Wilson | A framework for security technology cohesion in the era of the GDPR | |
Kapoor et al. | Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical records | |
Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
Macharia | Cloud computing risk: a decision-making framework | |
Beeskow | Reducing security risk using data loss prevention technology | |
Rajadorai et al. | Data Protection and Data Privacy Act for BIG DATA Governance | |
Kamarinou et al. | Compliance as a service | |
Shrestha et al. | Study on security and privacy related issues associated with BYOD policy in organizations in Nepal | |
Naranjo Rico | Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques | |
Toohey | Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks | |
Swartz | Protecting information from insiders: although organizations are making strides in protecting their sensitive information from outside threats, reports show they often are failing to protect it from the much greater threats posed by their own employees | |
Waghmare | Security and ethical considerations when using ChatGPT | |
Glaser et al. | Healthcare IT trends raise bar for information security | |
Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
Loumbas et al. | Data Security Implications in Digital Health:: A Cautionary Tale | |
Sulistio et al. | Towards a self-protecting cloud | |
Chaudhary et al. | Privacy risk management | |
Greisiger et al. | Cyber liability & data breach insurance claims |