Data breaches are occurring at an unprecedented rate. In February 2019 alone, over a million individuals were reported to the United States government as having been involved in a breach of their medical data by healthcare entities. Although many organizations have some policies, procedures and risk management components in place, few (if any) organizations are centrally connecting legal requirements, penetration tests, policies and procedures into a standardized and consistent methodology for further analysis and auditing. This research produces a new open source risk management standardized library coordinating the aforementioned risk management components. The new library is applied to an open source vulnerable web-application exampl...
The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had th...
Cyber security risk assessments in the healthcare industry are legally required and demand an ongoin...
Abstract — Hemorrhages of confidential patient health data create privacy and security concerns. Whi...
Our societal quest for collaboration and openness has always been in direct conflict with our desire...
The healthcare system in the United States has a sophisticated and an industry-unique set of legal r...
Abstract—BACKGROUND: Information Security is impor-tant for e-Science research groups and other smal...
Risk management is a concept which has becomes very popular with a number of national and internatio...
In today’s business environment, almost all information is captured and stored in electronic form. T...
abstract: The purpose of this project is to develop a risk assessment tool for the University of Cal...
In the era of technology and an increasingly interconnected environment, information security has be...
Health information systems contain information about one\u27s health status, history of disease, liv...
The following study provides a risk analysis of the forthcoming nationwide healthcare information sy...
As part of INFO I499 Readings and Research in Informatics. Faculty advisor: Sara Anne Hook.In the ...
Security and privacy are particularly important for health applications and health-related devices. ...
In this paper the author describes work towards developing an integrative framework for educating he...
The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had th...
Cyber security risk assessments in the healthcare industry are legally required and demand an ongoin...
Abstract — Hemorrhages of confidential patient health data create privacy and security concerns. Whi...
Our societal quest for collaboration and openness has always been in direct conflict with our desire...
The healthcare system in the United States has a sophisticated and an industry-unique set of legal r...
Abstract—BACKGROUND: Information Security is impor-tant for e-Science research groups and other smal...
Risk management is a concept which has becomes very popular with a number of national and internatio...
In today’s business environment, almost all information is captured and stored in electronic form. T...
abstract: The purpose of this project is to develop a risk assessment tool for the University of Cal...
In the era of technology and an increasingly interconnected environment, information security has be...
Health information systems contain information about one\u27s health status, history of disease, liv...
The following study provides a risk analysis of the forthcoming nationwide healthcare information sy...
As part of INFO I499 Readings and Research in Informatics. Faculty advisor: Sara Anne Hook.In the ...
Security and privacy are particularly important for health applications and health-related devices. ...
In this paper the author describes work towards developing an integrative framework for educating he...
The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had th...
Cyber security risk assessments in the healthcare industry are legally required and demand an ongoin...
Abstract — Hemorrhages of confidential patient health data create privacy and security concerns. Whi...