A Framework for an Effective Information Security Awareness Program in Healthcare
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
Electronic Health Record (EHR) is a valuable asset of every healthcare and it needs to be protected. Human errors are recognized as the major information security threats to EHR systems. Employees who interact with EHR systems should be trained about the risks and hazards related to information security. However, there are limited studies regarding the effectiveness of training programs. The aim of this paper is to propose a framework that provides guidelines for healthcare organizations to select an effective information security training delivery method. In addition, this paper proposes a guideline to develop information security content for awareness training programs. Lastly, this study attempts to implement the proposed framework in a selected healthcare for evaluation. Hence, a serious game is developed as a training method to deliver information security content for the selected healthcare. An effective training program raises employees’ awareness toward information security with a long-term impact. It helps to gradually change employees’ behavior over time by reducing their negligence towards secure utilization of healthcare EHR systems.
Authors and Affiliations
Arash Ghazvini, Zarina Shukur
Power and Contention Control Scheme: As a Good Candidate for Interference Modeling in Cognitive Radio Network
Due to the ever growing need for spectrum, the cognitive radio (CR) has been proposed to improve the radio spectrum utilization. In this scenario, the secondary users (SU) are permitted to share spectrum with the license...
Writing Kurdish Alphabetics in Java Programming Language
Nowadays, Kurdish programmers usually suffer when they need to write Kurdish letter while they program in java. More to say, all the versions of Java Development Kits have not supported Kurdish letters. Therefore, the ai...
An Extensive Survey over Traffic Management/Load Balance in Cloud Computing
Cloud Computing (CC) is all about carrying out processing in other's system. There are various vendors who provide CC services. The basic algorithm that should be met to access CC services is a need for steady internet c...
Clone Detection Using DIFF Algorithm For Aspect Mining
Aspect mining is a reverse engineering process that aims at mining legacy systems to discover crosscutting concerns to be refactored into aspects. This process improves system reusability and maintainability. But, locati...
Web Usability and User Trust on E-commerce Websites in Pakistan
Web usability is an integral part of e-commerce. Users are less prone to the websites which are difficult to navigate and slow in response time. E-commerce business is growing aggressively on daily basis, but lack of use...