In a ‘trusting’ environment, everyone is responsible for information security

Information Security Technical Report - Tập 13 - Trang 207-215 - 2008
Patricia A.H. Williams1
1School of Computer and Information Science, Edith Cowan University, 2 Bradford Street, Mt Lawley, Western Australia 6050, Australia

Tài liệu tham khảo

Aagedal JØ, Braber FD, Dimitrakos T, Gran BA, Raptis D, Stölen K. Model-based risk assessment to improve enterprise security. In: Paper presented at the proceedings of the sixth international enterprise distributed object computing conference (EDOC'02); 2002. Anderson RH. Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems. In: Paper presented at the results of a three-day workshop, RAND, Santa Monica, CA; 1999. Anderson RH, Bozek T, Longstaff T, Meitzer W, Skroch M, Van Wyk K. Research on mitigating the insider threat to information systems – #2. In: Proceedings of a Workshop, RAND, Santa Monica, CA; August 2000. Bachman, 1998, Developing a common nursing practice model, Nursing Management, 29, 26, 10.1097/00006247-199801010-00006 Barber B, Louwerse K, Davey J. White paper on health care information security. ISHTAR White Paper Retrieved 19 January 2006, 1998; Available from: <http://ted.see.plymouth.ac.uk/ishtar/deliverables/white%20paper.html>. BBC News. Nearly 100 medical records ‘lost’ journal, 2008; Retrieved from: <http://news.bbc.co.uk/2/hi/uk_news/northern_ireland/7555165.stm>. Becker, 2007, Information governance in NHS's NPfIT: a case for policy specification, International Journal of Medical Informatics, 76, 432, 10.1016/j.ijmedinf.2006.09.008 Beresnevichiene, 2003 Bolton, 1999, A relationship between computerisation and quality in general practice, Australian Family Physician, 28, 962 Business Software Alliance. Information security governance: toward a framework for action. Retrieved 03 July 2006, 2003; Available from: <http://www.entrust.com/resources/whitepapers.cfm>. Coiera, 1998, Communication behaviours in a hospital setting: an observational study, British Medical Journal, 316, 673, 10.1136/bmj.316.7132.673 de Dombal, 1993, Medical decision making, clinical judgment, and decision analysis, 1 Dhillon, 2001, Computer crimes: theorizing about the enemy within, Computers and Security, 20, 715, 10.1016/S0167-4048(01)00813-6 Doherty, 2006, Aligning the information security policy with the strategic information systems plan, Computers and Security, 25, 55, 10.1016/j.cose.2005.09.009 erisk. Daiwa (case study). Retrieved 01 August 2008, 2001; Available from: <http://www.erisk.com/Learning/CaseStudies/Daiwa.asp>. erisk. Barings (case study). Retrieved 01 August 2008, 2005; Available from: <http://www.erisk.com/Learning/CaseStudies/Barings.asp>. Fox B. “Cooperative security”: a model for the new enterprise. Journal, 1998. Retrieved from: <citeseer.ist.psu.edu/316968.html>. Furnell, 2005, Why users cannot use security, Computers and Security, 24, 274, 10.1016/j.cose.2005.04.003 Furnell, 2006, The challenges of understanding and using security: a survey of end-users, Computers and Security, 25, 27, 10.1016/j.cose.2005.12.004 Hamilton, 2006 Harris S. Learning guide: information security governance guide. Retrieved 5 March 2008, 2006a; Available from: <http://searchsecurity.techtarget.com/general/0295582,sid14_gci1211236,00.html>. Harris S. Risk management strategies: key elements when building an information security program. Retrieved 5 March 2008, 2006b; Available from: <http://searchsecurity.techtarget.com/tip/0289483,sid14_gci1210562,00.html>. Hinde, 2003, The inside threat. (malicious insider), Computers aND Security, 22, 665 I3P. Human behavior, insider threat and awareness, Retrieved 13 August 2008, 2008; Available from: <http://www.thei3p.org/research/insider_threat.html>. IP Governance Task Force. Intellectual property & information security governance. Retrieved 13 February 2008, 2007; Available from: <http://onlinebrandrating.net/isgovernanceframework.pdf>. Johnston, 2008, Information privacy compliance in the healthcare industry, Information Management and Computer Security, 16, 5, 10.1108/09685220810862715 Leach, 2003, Improving user security behaviour, Computers and Security, 22, 685, 10.1016/S0167-4048(03)00007-5 Loe, 2000, A review of empirical studies assessing ethical decision making in business, Journal of Business Ethics, 25, 185, 10.1023/A:1006083612239 Magklaras, 2005, A preliminary model of end user sophistication for insider threat prediction in IT systems, Computers and Security, 24, 371, 10.1016/j.cose.2004.10.003 Masys, 2002, Giving patients access to their medical records via the internet: the PCASSO experience [research], Journal of the American Medical Informatics Association, 9, 181, 10.1197/jamia.M1005 McCollum, 2004, Low-tech users threaten financial sector systems (update), Internal Auditor, 61, 18 Mercuri, 2004, The HIPAApotamus in health care data security, Communications of the ACM, 47, 25, 10.1145/1005817.1005840 Meredith, 2005, Data protection and freedom of information, BMJ, 330, 490, 10.1136/bmj.330.7490.490 Moynihan, 2007, Data under surveillance: a government agency blends technology, audit, and investigative techniques to protect confidential information. (TECH FORUM) (Office of Internal Audit's Information Security Unit), Internal Auditor, 64, 29 Mulligan, 2001, Confidentiality in health records: evidence of current performance form a population survey in South Australia, Medical Journal of Australia, 174, 637, 10.5694/j.1326-5377.2001.tb143472.x National Threat Assessment Center. National Threat Assessment Center – insider threat study. Retrieved 13 August 2008, 2008; Available from: <http://www.ustreas.gov/usss/ntac_its.shtml>. Nixu. Security management consulting. Retrieved 5 March 2008, 2008; Available from: <http://www.nixu.com/is/smc/>. Peterson, 2002, Computer ethics: the influence of guidelines and universal moral beliefs, Information Technology and People, 15, 346, 10.1108/09593840210453124 Schultz, 2002, A framework for understanding and predicting insider attacks, Computers and Security, 21, 526, 10.1016/S0167-4048(02)01009-X 1988 Spil TAM, Stegwee RA, Teitink CJ. Business intelligence in healthcare organisations. In: Paper presented at the 35th Hawaii international conference on system sciences (HICSS-35'02), Hawaii; 2002. Stetson, 1997, Achieving effective medical information security: understanding the culture, Bulletin of the American Society for Information Science, 23, 17, 10.1002/bult.52 Straub, 1998, Coping with systems risk: security planning models for management decision making, MIS Quarterly, 22, 441, 10.2307/249551 Treacher, 1996, An overview of SEISMED, vol. 27, 4 Vanmeerbeek, 2004, Exploitation of electronic medical records data in primary health care. Resistances and solutions. Study in eight Walloon health care centres, Studies In Health Technology and Informatics, 110, 42 von Solms, 2005, Information security governance – compliance management vs operational management, Computers and Security, 24, 443, 10.1016/j.cose.2005.07.003 Whitman, 2004, In defense of the realm: understanding the threats to information security, International Journal of Information Management, 24, 43, 10.1016/j.ijinfomgt.2003.12.003 Williams, 2007, Information governance: a model for security in medical practice, Journals of Digital Forensics, Security and Law, 2, 57 Williams, 2007, Medical data security: are you informed or afraid?, International Journal of Information and Computer Security, 1, 414, 10.1504/IJICS.2007.015502 Williams, 2008, How addressing implementation issues can assist in medical information security governance, 116 Williams, 2008, When trust defies common security sense, Health Informatics Journal, 14, 211, 10.1177/1081180X08092831 Willison, 2006, Understanding the offender/environment dynamic for computer crimes, Information Technology and People, 19, 170, 10.1108/09593840610673810 Wood, 2002, An insider threat model for adversary simulation, 41