{"id":"https://openalex.org/W44711323","doi":"https://doi.org/10.3233/978-1-61499-240-0-195","title":"Implementing Healthcare Information Security: Standards Can Help","display_name":"Implementing Healthcare Information Security: Standards Can Help","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W44711323","doi":"https://doi.org/10.3233/978-1-61499-240-0-195","mag":"44711323","pmid":"https://pubmed.ncbi.nlm.nih.gov/23542997"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-240-0-195","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-240-0-195","pdf_url":null,"source":{"id":"https://openalex.org/S4210179765","display_name":"Studies in health technology and informatics","issn_l":"0926-9630","issn":["0926-9630","1879-8365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Health Technology and Informatics","raw_type":"book-chapter"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/978-1-61499-240-0-195","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072739422","display_name":"Andrej Orel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Orel Andrej","raw_affiliation_strings":["Marand d.o.o., Ljubljana, Slovenia. andrej.orel@marand.si"],"affiliations":[{"raw_affiliation_string":"Marand d.o.o., Ljubljana, Slovenia. andrej.orel@marand.si","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063411302","display_name":"Igor Bernik","orcid":"https://orcid.org/0000-0003-1644-5672"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bernik Igor","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072739422"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.0269764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"186","issue":null,"first_page":"195","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8105999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8105999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10350","display_name":"Electronic Health Records Systems","score":0.7850000262260437,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.7042145729064941},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6487032771110535},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.6306995749473572},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.5841094851493835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5653479695320129},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.5461935997009277},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5021169185638428},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.49470993876457214},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4469107389450073},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.4208531677722931},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34844982624053955},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32523125410079956},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.323574423789978},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12408033013343811}],"concepts":[{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.7042145729064941},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6487032771110535},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.6306995749473572},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.5841094851493835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5653479695320129},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.5461935997009277},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5021169185638428},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.49470993876457214},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4469107389450073},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.4208531677722931},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34844982624053955},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32523125410079956},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.323574423789978},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12408033013343811},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0}],"mesh":[{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D012637","descriptor_name":"Security Measures","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D012637","descriptor_name":"Security Measures","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D012637","descriptor_name":"Security Measures","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D017410","descriptor_name":"Practice Guidelines as Topic","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D017410","descriptor_name":"Practice Guidelines as Topic","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D017410","descriptor_name":"Practice Guidelines as Topic","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D038622","descriptor_name":"Internationality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D038622","descriptor_name":"Internationality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D038622","descriptor_name":"Internationality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D063005","descriptor_name":"Health Information Systems","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D063005","descriptor_name":"Health Information Systems","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false},{"descriptor_ui":"D063005","descriptor_name":"Health Information Systems","qualifier_ui":"Q000592","qualifier_name":"standards","is_major_topic":false}],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-61499-240-0-195","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-240-0-195","pdf_url":null,"source":{"id":"https://openalex.org/S4210179765","display_name":"Studies in health technology and informatics","issn_l":"0926-9630","issn":["0926-9630","1879-8365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Health Technology and Informatics","raw_type":"book-chapter"},{"id":"pmid:23542997","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/23542997","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in health technology and informatics","raw_type":null}],"best_oa_location":{"id":"doi:10.3233/978-1-61499-240-0-195","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-240-0-195","pdf_url":null,"source":{"id":"https://openalex.org/S4210179765","display_name":"Studies in health technology and informatics","issn_l":"0926-9630","issn":["0926-9630","1879-8365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Health Technology and Informatics","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2126017555","https://openalex.org/W2483557577","https://openalex.org/W820134910","https://openalex.org/W2370581992","https://openalex.org/W2149739119","https://openalex.org/W2397926003","https://openalex.org/W2555665621","https://openalex.org/W2354737822","https://openalex.org/W2248314326","https://openalex.org/W2800653357"],"abstract_inverted_index":{"Using":[0],"widely":[1],"spread":[2],"common":[3],"approaches":[4],"to":[5,41,103],"systems":[6],"security":[7,59,90,131,157,172],"in":[8,39,56,74,96,121,174],"health":[9,43,127,175],"dedicated":[10],"controlled":[11,110],"environments,":[12],"a":[13,78,81,105],"level":[14,133],"of":[15,20,46],"awareness,":[16],"confidence":[17],"and":[18,70,100,137,147,153],"acceptance":[19],"relevant":[21],"standardisation":[22],"is":[23,27,45,93,140,159],"evaluated.":[24],"Patients'":[25],"information":[26,44,58,89,156,171],"sensitive,":[28],"so":[29,144],"putting":[30],"appropriate":[31],"organisational":[32],"techniques":[33],"as":[34,36,187],"well":[35,179],"modern":[37],"technology":[38],"place":[40],"secure":[42],"paramount":[47],"importance.":[48],"Mobile":[49],"devices":[50],"are":[51,68,119,176],"becoming":[52],"the":[53,154,168],"top":[54],"priorities":[55],"advanced":[57],"planning":[60],"with":[61,134,183],"healthcare":[62,75],"environments":[63],"being":[64],"no":[65],"exception.":[66],"There":[67],"less":[69,71],"application":[72],"areas":[73,107],"without":[76],"having":[77],"need":[79],"for":[80,124],"mobile":[82],"functionality":[83],"which":[84],"represents":[85],"an":[86],"even":[87],"greater":[88],"challenge.":[91],"This":[92],"also":[94],"true":[95],"emergency":[97],"treatments,":[98],"rehabilitation":[99],"homecare":[101],"just":[102],"mention":[104],"few":[106],"outside":[108],"hospital":[109],"environments.":[111],"Unfortunately":[112],"quite":[113],"often":[114,177],"traditional":[115],"unsecured":[116],"communications":[117],"principles":[118,185],"still":[120],"routine":[122],"use":[123],"communicating":[125],"sensitive":[126],"related":[128],"information.":[129],"The":[130],"awareness":[132],"users,":[135],"patients":[136],"care":[138],"professionals":[139],"not":[141,150,178],"high":[142],"enough":[143],"potential":[145],"threats":[146],"risks":[148],"may":[149],"be":[151],"addressed":[152],"respective":[155],"management":[158],"therefore":[160],"weak.":[161],"Standards":[162],"like":[163],"ISO/IEC":[164,169],"27000":[165],"ISMS":[166],"family,":[167],"27799":[170],"guidelines":[173],"known,":[180],"but":[181],"together":[182],"legislation":[184],"such":[186],"HIPAA,":[188],"they":[189],"can":[190],"help.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
