Selected Aspects of Information Security Management in Entities Performing Medical Activity

Q2 Business, Management and Accounting International Journal of Advanced Operations Management Pub Date : 2021-01-30 DOI:10.18775/IJOM.2757-0509.2020.12.4004
Dominika Lisiak-Felicka, P. Nowak, M. Szmit
{"title":"Selected Aspects of Information Security Management in Entities Performing Medical Activity","authors":"Dominika Lisiak-Felicka, P. Nowak, M. Szmit","doi":"10.18775/IJOM.2757-0509.2020.12.4004","DOIUrl":null,"url":null,"abstract":"The article is devoted to the issues related to an information security management in medical entities. The healthcare entities have been amongst the prime targets for hackers for several years. According to the IBM report “The 2016 X-Force Cyber Security Intelligence Index” in 2015 most of the attacks were carried out against these entities. The years 2016 and 2017 also witnessed spectacular cyberattacks, for example: medical records breach of 3.3 million people because of an unauthorized access to a server in the US, some WannaCry ransomware attacks on the UK hospitals, some MongoDB Database Leaks in the US or NotPetya ransomware attacks in the US hospitals. Entities performing medical activity are processing personal data concerning health that is classified as a “sensitive data” and needs a special protection. The article presents the results of the survey – interviews with IT managers (or designated persons) in entities performing medical activity in Lodz Voivodeship in Poland. The aim of the research was analysis and evaluation of information security management in these entities. The interviews had been performed between December, 2017 and January, 2018. As the results of the research, the ways of information security management were identified (in particular such aspects as: characteristics of the information security teams, information security management system auditing, risk management, information security incidents, budgets for information security, training and the General Data Protection Regulation implementation). The paper also describes the types of information that should be protected in healthcare entities and characteristic of surveyed entities that subordinate to the local government of Lodz Voivodeship in Poland.","PeriodicalId":38027,"journal":{"name":"International Journal of Advanced Operations Management","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Operations Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18775/IJOM.2757-0509.2020.12.4004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 1

Abstract

The article is devoted to the issues related to an information security management in medical entities. The healthcare entities have been amongst the prime targets for hackers for several years. According to the IBM report “The 2016 X-Force Cyber Security Intelligence Index” in 2015 most of the attacks were carried out against these entities. The years 2016 and 2017 also witnessed spectacular cyberattacks, for example: medical records breach of 3.3 million people because of an unauthorized access to a server in the US, some WannaCry ransomware attacks on the UK hospitals, some MongoDB Database Leaks in the US or NotPetya ransomware attacks in the US hospitals. Entities performing medical activity are processing personal data concerning health that is classified as a “sensitive data” and needs a special protection. The article presents the results of the survey – interviews with IT managers (or designated persons) in entities performing medical activity in Lodz Voivodeship in Poland. The aim of the research was analysis and evaluation of information security management in these entities. The interviews had been performed between December, 2017 and January, 2018. As the results of the research, the ways of information security management were identified (in particular such aspects as: characteristics of the information security teams, information security management system auditing, risk management, information security incidents, budgets for information security, training and the General Data Protection Regulation implementation). The paper also describes the types of information that should be protected in healthcare entities and characteristic of surveyed entities that subordinate to the local government of Lodz Voivodeship in Poland.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
执行医疗活动的实体信息安全管理的选定方面
本文致力于医疗机构信息安全管理的相关问题。几年来,医疗机构一直是黑客的主要目标之一。根据IBM的报告“2016年X-Force网络安全情报指数”,2015年大多数攻击都是针对这些实体进行的。2016年和2017年也见证了惊人的网络攻击,例如:由于未经授权访问美国服务器导致330万人的医疗记录泄露,英国医院遭受WannaCry勒索软件攻击,美国MongoDB数据库泄漏或美国医院遭受NotPetya勒索软件攻击。从事医疗活动的实体正在处理与健康有关的个人数据,这些数据被归类为“敏感数据”,需要特别保护。本文介绍了对波兰罗兹省从事医疗活动的实体的IT经理(或指定人员)进行访谈的调查结果。研究的目的是分析和评估这些实体的信息安全管理。这些采访是在2017年12月至2018年1月期间进行的。根据研究结果,确定了信息安全管理的方法(特别是信息安全团队的特征、信息安全管理系统审计、风险管理、信息安全事件、信息安全预算、培训和《一般数据保护条例》的实施等方面)。本文还描述了医疗保健实体中应受保护的信息类型,以及隶属于波兰罗兹省地方政府的受调查实体的特点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Advanced Operations Management
International Journal of Advanced Operations Management Decision Sciences-Management Science and Operations Research
CiteScore
2.20
自引率
0.00%
发文量
18
期刊介绍: In today''s complex, global economy, the operations function is critical to business success. All organisations have an operations function that helps them run efficiently and productively. IJAOM is a peer reviewed international journal which publishes original, high-quality and cutting-edge research on all aspects of advanced operations management, aiming at bridging the gap between theory and practice with applications analysing the real situation. Topics covered include -Global operations management, lean/agile operations -Knowledge, service, demand and R&D management -Scheduling, sequencing, vehicle routing -Inventory management and co-ordination -Multi-objective optimisation; TQM and six sigma practices -Business process outsourcing -Aggregate planning, ERP, JIT -Performance measurement -Cultural, environmental and implementation issues -Logistics service performance, supply chain management -Product planning, lot sizing, MPS, MRP -Repetitive manufacturing and service operations -Project and technology management, network management -Modelling and simulation, decision analysis/making -Comparison of operations management in different countries
期刊最新文献
Multi-Product Production Optimization of Maintenance Integrated into the Control Chart Under Service Level and Quality Constraints The Pros and Cons of Inventory Control Strategies, and How Does it Affect the Company’s Performance Split-Ticket Voting in Voter Behaviour of the Regional Election (Case Study of Governor Election and Deputy Governor of Central Kalimantan in 2016) Recruitment Process Outsourcing (RPO) Motivators: A Study of the Industrial Sector New models for the two-sided assembly line balancing problem
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1