Deakin University
Browse

Modelling context-aware security for electronic health records

chapter
posted on 2007-12-01, 00:00 authored by Pravin Shetty, Seng LokeSeng Loke
The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security.

History

Chapter number

69

Pagination

463-469

ISBN-13

9781591409878

ISBN-10

159140987X

Language

eng

Publication classification

B1.1 Book chapter

Copyright notice

2008, IGI Global

Extent

95

Editor/Contributor(s)

Quigley M

Publisher

Information Science Reference (an imprint of IGI Global)

Place of publication

Hershey Pa.

Title of book

Encyclopedia of Information Ethics and Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC