Open Access Open Access  Restricted Access Subscription Access

Privacy Risks and Security Threat Strategy to Optimize the Vulnerability in Health Information System (HIS)


Affiliations
1 Department of Computer Science and Technology, Xidian University, Xi’an, Shaanxi, China
 

Health information systems (HIS) generally access, process, or maintain large volumes of sensitive data corresponding to the patient, health service provider (HSP), clinicians, and other stakeholders. Hence, ensuring health data security is a primary concern to improve patient outcomes, inform research, and influence policy-making. Many countries across the world practice data protection and privacy preservation laws against numerous threats related to health data and its communication between the computer networks. Hence, resolving the health information security flaws by designing a potential threat model is always given significant importance. The main objective of this study is to emphasize the concerns related to privacy risks and security threats with the use of HIS.

Keywords

Exchange, Health, Information, Privacy, Vulnerability.
User
Notifications
Font Size


  • Privacy Risks and Security Threat Strategy to Optimize the Vulnerability in Health Information System (HIS)

Abstract Views: 285  |  PDF Views: 0

Authors

Mohammad Amanul Islam
Department of Computer Science and Technology, Xidian University, Xi’an, Shaanxi, China

Abstract


Health information systems (HIS) generally access, process, or maintain large volumes of sensitive data corresponding to the patient, health service provider (HSP), clinicians, and other stakeholders. Hence, ensuring health data security is a primary concern to improve patient outcomes, inform research, and influence policy-making. Many countries across the world practice data protection and privacy preservation laws against numerous threats related to health data and its communication between the computer networks. Hence, resolving the health information security flaws by designing a potential threat model is always given significant importance. The main objective of this study is to emphasize the concerns related to privacy risks and security threats with the use of HIS.

Keywords


Exchange, Health, Information, Privacy, Vulnerability.

References