Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал:
http://repository.mu.edu.ua/jspui/handle/123456789/4843
Повний запис метаданих
Поле DC | Значення | Мова |
---|---|---|
dc.contributor.author | Shevchenko, S. | - |
dc.contributor.author | Zhdanova, Y. | - |
dc.contributor.author | Dreis, Yurii | - |
dc.contributor.author | Kyrychok, R. | - |
dc.contributor.author | Tsyrkaniuk, D. | - |
dc.date.accessioned | 2024-01-01T09:46:12Z | - |
dc.date.available | 2024-01-01T09:46:12Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://repository.mu.edu.ua/jspui/handle/123456789/4843 | - |
dc.description | Shevchenko S. Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach / S. Shevchenko, Y. Zhdanova, Y. Dreis, R. Kyrychok, D. Tsyrkaniuk // CEUR Workshop Proceedings (CEUR-WS.org). – 2023. – Vol. 3421. – Р. 158–167. | en_US |
dc.description.abstract | The changes brought by informatization to society have a qualitative effect on the process of modernization of medical care. At the same time, the digitization of big data in healthcare creates numerous risks from the point of view of ensuring the confidentiality, integrity, and availability of information. Inadequate security is due to both objective and subjective reasons. Among them: are the lack of a sufficient number of qualified specialists in the field of information protection; budget restrictions; software conflict; lack of training in information security rules and skills of medical personnel; non-compliance with traditional cyber security practices; legal and ethical issues related to patient data. Determining the minimum and maximum possible degrees of risk of security breaches in information and telecommunication medical systems is the key to ensuring the protection of medical information. This confirms the significance and timeliness of this research, which is based on a risk-oriented approach. The analysis of the scientific literature, having allowed the designation of the components, is how the information-telecommunication system and the links between them are put together. For each asset, the source of the threat, the threat itself, and the variants of reaction to it are identified. | en_US |
dc.language.iso | other | en_US |
dc.subject | Information risks | en_US |
dc.subject | risk-oriented approach | en_US |
dc.subject | risk management | en_US |
dc.subject | information-telecommunication medical system | en_US |
dc.subject | telemedicine | en_US |
dc.subject | threats | en_US |
dc.subject | vulnerabilities | en_US |
dc.title | Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach | en_US |
dc.type | Article | en_US |
Розташовується у зібраннях: | Дрейс Юрій Олександрович |
Файли цього матеріалу:
Файл | Опис | Розмір | Формат | |
---|---|---|---|---|
dreis_prot_2023_158.pdf | 6,94 MB | Adobe PDF | Переглянути/Відкрити |
Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.