A classification of health information systems security flaws

  • Gritzalis D
  • Kantzavelou I
  • Katsikas S
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The increasing interest of both business and government sectors in information security issues has led up to the collection of several security incidents in inventories. Most of these inventories pertain to specific environments; among them there exist inventories pertaining to health information systems. Information included in these inventories could be exploited by information systems developers, if a proper means for their effective processing is provided. Such a means is a recently proposed taxonomy scheme which classifies information system security flaws according to how, where and when they been introduced. In this paper, this taxonomy scheme has been used to classify health information system security flaws. Conclusions based on the results of this classification are drawn.

Cite

CITATION STYLE

APA

Gritzalis, D., Kantzavelou, I., Katsikas, S., & Patel, A. (1995). A classification of health information systems security flaws (pp. 453–464). https://doi.org/10.1007/978-0-387-34873-5_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free