SePTIS: Workshop on Security and Privacy in Telecommunications and Information System

Author(s):  
Christophe Feltus

Traditionally, the relationship between the company and its providers have for objective to generate value at the company side in exchange of money. This relationship is largely investigated through the vector of value chain. In this article, security and privacy cocreation (SPCC) is investigated as a specialization of value cocreation. Although it is an important research topic, and despite a plethora of research aiming at depicting the fundamental of SPCC, few contributions have been appeared until now in the area of a language to support SPCC design and deployment. However, such a language is necessary to describe elements of the information system, as well as their underlying dependencies. As a result, this article proposes extending an existing enterprise architecture language to support the process of decision-making and to allow understanding and analysis of the impacts associated to a change of the system architecture as a whole.


2008 ◽  
Vol 47 (05) ◽  
pp. 399-408 ◽  
Author(s):  
J. Werner ◽  
Y. Lee ◽  
B. Malin ◽  
A. Ledeczi ◽  
J. Mathe

Summary Objective: The goal of this research is to provide a framework to enable the model-based development, simulation, and deployment of clinical information system prototypes with mechanisms that enforce security and privacy policies. Methods: We developed the Model-Integrated Clinical Information System (MICIS), a software toolkit that is based on model-based design techniques and highlevel modeling abstractions to represent complex clinical workflows in a service-oriented architecture paradigm. MICIS translates models into executable constructs, such as web service descriptions, business process execution language procedures, and deployment instructions. MICIS models are enriched with formal security and privacy specifications, which are enforced within the execution environment. Results: We successfully validated our design platform by modeling multiple clinical workflows and deploying them onto the execution platform. Conclusions: The model-based approach shows great promise for developing, simulating, and evolving clinical information systems with formal properties and policy restrictions.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Telecare Medicine Information System (TMIS) is now attracting field for remote healthcare, diagnosis and emergency health services etc. The major objective of this type of system is to provide medical facilities to patients who are critically ill and unable to attend hospitals or put in isolation for observations. A major challenge of such systems is to securely transmit patients' health related information to the medical server through an insecure channel. This collected sensitive data is further used by medical practitioners for diagnosis and treatment purposes. Therefore, security and privacy are essential for healthcare data. In this paper, a robust authentication protocol based on Chebyshev Chaotic map has been proposed for adequate security while transmitting data. The privacy preservation is maintained by a rule set which mainly controls the views. A detailed security analysis was performed for the proposed scheme.


2011 ◽  
Vol 26 (3) ◽  
pp. 521-545 ◽  
Author(s):  
Sandra J. Cereola ◽  
Ronald J. Cereola

ABSTRACT Internal control frameworks (ICF) provide a basis for understanding controls in an organization and for making judgments about the effectiveness of controls. The Sarbanes-Oxley Act of 2002 (SOX) requires companies to report, on an ongoing basis, the effectiveness of their internal controls in their annual filings. The Securities and Exchange Commission (SEC) recommends companies use ICF to help achieve compliance with SOX. ICF provide a useful tool for management and auditors evaluating and addressing the adequacy of controls in their organization. As there is no such thing as a “risk-free” enterprise, developing an understanding of ICF is important for students entering the accounting profession. This instructional case provides students the opportunity to assess internal control risks within an organization's information system using a “real-world” problem following COSO (SEC-recommended ICF) and/or COBIT as a guide. Students then evaluate the organization's overall level of internal control risks and formulate recommendations for mitigating such risks.


2019 ◽  
Vol 3 (1) ◽  
pp. 85
Author(s):  
. Deli

<p><span>This study was conducted to determine the influence of perceived Usefulness, ease of use (Perceived Ease of Use), security and Privacy of student admissions (Acceptance Of SISFO) at Universitas Batam International through an approach using the Model Techonology acceptance model (TAM) using the analyzed variables are Perceived usefulness (PU), Perceived ease Of Use (PEU), Security and Privacy (SP). Respondents in this study involve active students of the International University of Batam, sampling conducted with purvosive sampling technique, related to the level of testing data obtained will be conducted by testing</span><span lang="IN"> v</span><span>alidity, </span><span lang="IN">r</span><span>ealiability test, regression test against variable Perceived usefulness (PU), Perceived ease Of Use (PEU), Security and Privacy (SP). </span><span lang="IN">D</span><span>ata processing in the study will be conducted empirically using SPSS software, which results the above expected from</span><span>independent variables is a significant test sample to determine the predicted acceptance rate to Academic information systems. </span><span><span lang="EN">The results of study show that testing </span><span lang="IN">of</span><span lang="EN"> independent variable is significant and jointly has a positive influence on the dependent variable, there is the greatest influence on the Security and Privacy (SP) variable</span><span lang="IN"> so </span><span lang="EN">the level of acceptance of </span><span lang="IN">academic</span><span lang="EN"> information system is expected to provide security and maintain the confidentiality of user data.</span></span></p>


2018 ◽  
Vol 7 (3.3) ◽  
pp. 477
Author(s):  
P Shobana Pritha ◽  
Dr A. Sasi Kumar

Almost all the human living in Earth forgets to take care of their health. To say specifically, the elder ones and the younger ones need con-tinuous examination to note down the variation in their health issues (either improvement or a decrement). This can be achieved through the digitalization of the data. In the present day scenario information security and privacy in healthcare systems is an issue that is growing at alarming rate. The espousal of digital records of the patient, the enlarged order, provider integration and the growing need to exchange in-formation between patients, providers and payers each targets at the necessity for a developed information system. Inspite of so many measures taken to prevent the theft of patient's healthcare records offenders find some loophole or the other to get the records. This article strives to list certain health issues faced by a majority of people, threats to HIS, the method adopted to store huge amount of data and measures to prevent security threats.  


2021 ◽  
Vol 12 (44) ◽  
pp. 37-46
Author(s):  
Alaattin PARLAKKILIÇ ◽  
Nevzat ÜNALAN

This study investigates user perception and resistance against change in the Hospital Information System (HIS) change. A quantitative approach with a survey was applied to determine perception and resistance ofvgroups.The results were compared with each other: the percentage of innovators (32%), the percentage of early adopters (21%), the percentage of early majority (31%), and the percentage of late majority (12%), and the percentage of laggards (4%). Acceptance differs due to financial reasons. The resistance differs according to the employees’ status. IT developments, management supported security and privacy rules increase employee performance and acceptance. For resistance, there has been a significant difference feedback of employees is required, and functional needs reduce resistance. Hospitals need to use new and up-to-date information technology in order to serve effective patient care with valid standards.


Author(s):  
Kamalendu Pal

Internet of Things (IoT) and blockchain technology-based information system (IS) can be used to improve tracking of goods and services in offering and build a collaborative operating environment among the business-partners of the manufacturing industry. In this process IS architecture plays an important role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT-centric architecture has led to a myriad of isolated data silos that hinder the full potential of holistic data-driven decision-support applications with the IoT because of technical issues (e.g., standalone IoT applications suffer from security and privacy-related problems). This chapter presents a proof of concept of a hybrid enterprise information system architecture, which consists of IoT-based applications and a blockchain-oriented distributed-ledger system to support-transaction services within a multiparty global manufacturing (e.g., textile and clothing business) network.


Sign in / Sign up

Export Citation Format

Share Document