RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records

        Nehama Lewis,Yaron Connelly,Gil Henkin,Max Leibovich,Adi Akavia 대한의료정보학회 2022 Healthcare Informatics Research Vol.28 No.2

        Objectives: Healthcare organizations that maintain and process Electronic Medical Records are at risk of cyber-attacks,which can lead to breaches of confidentiality, financial harm, and possible interference with medical care. State-of-the-artmethods in cryptography have the potential to offer improved security of medical records; nonetheless, healthcare providersmay be reluctant to adopt and implement them. The objectives of this study were to assess current data management andsecurity procedures; to identify attitudes, knowledge, perceived norms, and self-efficacy regarding the adoption of advancedcryptographic techniques; and to offer guidelines that could help policy-makers and data security professionals work togetherto ensure that patient data are both secure and accessible. Methods: We conducted 12 in-depth semi-structured interviewswith managers and individuals in key cybersecurity positions within Israeli healthcare organizations. The interviews assessedperceptions of the feasibility and benefits of adopting advanced cryptographic techniques for enhancing data security. Qualitativedata analysis was performed using thematic network mapping. Results: Key data security personnel did not perceiveadvanced cybersecurity technologies to be a high priority for funding or adoption within their organizations. We identifiedthree major barriers to the adoption of advanced cryptographic technologies for information security: barriers associatedwith regulators; barriers associated with healthcare providers; and barriers associated with the vendors that develop cybersecuritysystems. Conclusions: We suggest guidelines that may enhance patient data security within the healthcare system andreduce the risk of future data breaches by facilitating cross-sectoral collaboration within the healthcare ecosystem.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼