Digital Library

cab1

 
Title:      A COMPARATIVE REVIEW OF INFORMATION SECURITY RISK ASSESSMENT METHODOLOGIES FOR HEALTH CARE
Author(s):      N. Hazelhoff Roelfzema
ISBN:      978-972-8939-46-5
Editors:      Piet Kommers and Pedro Isaías
Year:      2011
Edition:      Single
Keywords:      Risk assessment, information security, health care, governance.
Type:      Full Paper
First Page:      141
Last Page:      148
Language:      English
Cover:      cover          
Full Contents:      click to dowload Download
Paper Abstract:      Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk assessments and the implementation of controls to secure data. In theory, any state of the art risk assessment technique could be employed to facilitate the prevention and/or management of potential information risks. Health care environments are, however, quite unique when compared to other automated environments and different sectors do not experience similar kinds of information security attacks. Where security issues have been researched in health care, there is a strong emphasis on the development of technological measures for data protection but the ‘human’ or professional side of ensuring data security is equally important in everyday practice. In this paper, seven methodologies for risk assessment are compared in a framework with specific health care requirements. It is concluded that improvements could be made in comparative frameworks to support the selection process for a suitable risk assessment approach. Furthermore, the available methods show several weaknesses in their ability to quantify risks or to include human risk factors. The presentation of threat events and their interaction is often oversimplified. Data aggregation is not possible in order to allow regulators to gain insight in trends and high level security threats. An integration of existing techniques is proposed to facilitate reliable and repeatable risk assessments that contribute to compliance to governance codes, and costs savings by making informed -sector wide- decisions to invest in the development of new systems and security controls
   

Social Media Links

Search

Login