Your browser does not support JavaScript!

Information security and privacy in healthcare records: threat analysis, classification, and solutions

Information security and privacy in healthcare records: threat analysis, classification, and solutions

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Information security and privacy in healthcare information system is a very critical matter. The increasing acceptance of information systems by various healthcare institutions and increasing security and privacy concerns among patients, all point to the need for proper frameworks of information security and privacy in place. In this paper, we have analyzed numerous categories of threats to a health information system and have identified threats that are unique to a health information system. Later, we have explored various models and algorithms that may be utilized to alleviate these threats. Finally, we have proposed future directions that may encourage further research into this field.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Threats to information security and privacy
  • 9.2.1 Understanding information security and privacy
  • 9.2.2 Classification of threats
  • Organizational threats
  • Systemic threats
  • 9.3 Information security and privacy disciplines
  • 9.3.1 Information access control
  • 9.3.2 Statistical disclosure control
  • 9.4 Models and algorithms
  • 9.4.1 Information access control
  • Role-based access control
  • Contextual role-based access control
  • Tag-based data model
  • Privacy management architecture
  • 9.4.2 Statistical disclosure control
  • Pseudonymization
  • p-sensitive k-anonymity property
  • Microaggregation
  • 9.5 Conclusions and future directions
  • References

Inspec keywords: health care; data privacy; medical information systems; information systems; security of data

Other keywords: increasing security; healthcare records; health information system; information security; healthcare information system; privacy concerns; information systems

Subjects: Data security; Biology and medical computing; Medical administration

Preview this chapter:
Zoom in

Information security and privacy in healthcare records: threat analysis, classification, and solutions, Page 1 of 2

| /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch9-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch9-2.gif

Related content

This is a required field
Please enter a valid email address