Controlling Critical Risks in Healthcare

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-48 Number-1
Year of Publication : 2017
Authors : Sophia Segal
DOI :  10.14445/22312803/IJCTT-V48P106

MLA

Sophia Segal "Controlling Critical Risks in Healthcare". International Journal of Computer Trends and Technology (IJCTT) V48(1):24-26, June 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Healthcare is a rapidly growing sector and an active research area which allows doctors to access patients remotely. Today’s healthcare automation problem requires different methods to address the issues in security. Both the patient’s information and IT infrastructure should be protected. Healthcare automation systems are facing more and more security threads that causes loss or damage of data. As a Risk Analysis and Requirements expert, I understand that IT data requirements is also one of the most valuable assets to a pharmaceutical or healthcare company. Data is key to the whole clinical development process. Without clean data, the value of a project, drug or product may not be fully realized. There are many solutions which reduces vulnerability in health care systems so that it becomes impossible for hackers to compromise the system. If vulnerabilities in the system are not identified, defects become extremely expensive and burdensome to fix and can escalate to critical risk, fast. [16] This paper focuses on critical health care security risks and gives few solutions to overcome and control them.

References
[1] "Health topics: Health systems". www.who.int. WHO World Health Organisation. Retrieved 2013-11-24.
[2] "Health at a Glance 2013 - OECD Indicators" (PDF). OECD. 2013-11-21. pp. 5, 39, 46, 48. (link). Retrieved 2013-11-24.
[3] "OECD.StatExtracts, Health, Health Status, Life expectancy, Total population at birth, 2011" (online statistics). stats.oecd.org/. OECD`s iLibrary. 2013. Retrieved 2013-11-24.
[4] Anderson, Nate (February 9, 2011). "How one man tracked down Anonymous—and paid a heavy price". Arstechnica.com. Retrieved March 29, 2011.
[5] Palilery, Jose (December 24, 2014). "What caused Sony hack: What we know now". CNN Money. Retrieved January 4, 2015.
[6] Privacy Rights Clearinghouse. http://www.privacyrights.org
[7] Mansouri, Najme, GholamHoseinDastghaibyfard, and Ehsan Mansouri. "Combination of data replication and scheduling algorithm for improving data availability in Data Grids." Journal of Network and Computer Applications (2013)
[8] Dragan Simic; SreckoRistic; Slobodan Obradovic (April 2007). "Measurement of the Achieved Performance Levels of the WEB Applications With Distributed Relational Database" (PDF). Electronics and Energetics. FactaUniversitatis. p. 31–43. Retrieved 30 January 2014
[9] "Hacker Lexicon: What Is End-to-End Encryption?". WIRED. Retrieved 22 December 2015.
[10] Chris Alexander, Ian Avrum Goldberg (February 2007). "Improved User Authentication in Off-The-Record Messaging" (PDF). Proceedings of the 2007 ACM workshop on Privacy in electronic society. New York: Association for Computing Machinery: 41–47. doi:10.1145/1314333.1314340
[11] Chris Alexander, Ian Avrum Goldberg (February 2007). "Improved User Authentication in Off-The-Record Messaging" (PDF). Proceedings of the 2007 ACM workshop on Privacy in electronic society. New York: Association for Computing Machinery: 41–47. doi:10.1145/1314333.1314340
[12] Goodin, Dan (20 May 2013). "Think your Skype messages get end-to-end encryption? Think again". ArsTechnica
[13] Segal, Sophia (13 March 2017). "Best practices to prevent data breaches.". Risk Management Magazine, http://www.rmmagazine.com/2017/03/13/best-practices-to-prevent-data-breaches/.
[14] Segal, Sophia ( 03 February 2017). " User Acceptance Testing and the Application Lifecyle". Simple Talk, https://www.simple-talk.com/dotnet/net-development/user-acceptance-testing-application-lifecycle/
[15] Segal, Sophia( 12 March 2017). "A Framework for removing ambiguity from software requirements. IIOAB Journal. ISSN 0976-3104. P 43-46
[16] Segal, Sophia (March 14 2017). "Overcoming poor usability and user Requirements". Test Magazine, p2-4.

Keywords
Healthcare automation systems, security threads, vulnerability in health care systems, risk assessment.