[go: up one dir, main page]

Kapoor et al., 2013 - Google Patents

Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical records

Kapoor et al., 2013

Document ID
3925286847067962890
Author
Kapoor A
Nazareth D
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

Breaches involving private consumer data are gaining more attention with the increasing push towards electronic records, and the demand for freer access to data. In the medical field, these breaches assume greater significance as they involve private data, and are …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Similar Documents

Publication Publication Date Title
Wikina What caused the breach? An examination of use of information technology and health data breaches
Khansa et al. Assessing innovations in cloud security
Sumner Information security threats: a comparative analysis of impact, probability, and preparedness
Chuma et al. Security of electronic personal health information in a public hospital in South Africa
Schunter Intel software guard extensions: Introduction and open research challenges
Hintzbergen et al. Foundations of Information Security Based on ISO27001 and ISO27002
Farrell Securing the cloud—governance, risk, and compliance issues reign supreme
Wilson A framework for security technology cohesion in the era of the GDPR
Kapoor et al. Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical records
Parker Healthcare regulations, threats, and their impact on cybersecurity
Macharia Cloud computing risk: a decision-making framework
Beeskow Reducing security risk using data loss prevention technology
Rajadorai et al. Data Protection and Data Privacy Act for BIG DATA Governance
Kamarinou et al. Compliance as a service
Shrestha et al. Study on security and privacy related issues associated with BYOD policy in organizations in Nepal
Naranjo Rico Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques
Toohey Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks
Swartz Protecting information from insiders: although organizations are making strides in protecting their sensitive information from outside threats, reports show they often are failing to protect it from the much greater threats posed by their own employees
Waghmare Security and ethical considerations when using ChatGPT
Glaser et al. Healthcare IT trends raise bar for information security
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
Loumbas et al. Data Security Implications in Digital Health:: A Cautionary Tale
Sulistio et al. Towards a self-protecting cloud
Chaudhary et al. Privacy risk management
Greisiger et al. Cyber liability & data breach insurance claims