Extent:
Online-Ressource (XX, 271p. 60 illus, digital)
Series:
Type of publication: Book / Working Paper
Language: English
Notes:
Includes bibliographical references
Foreword; Abstract; Contents; List of Figures; List of Tables; 1 Introduction; 1.1 Motivation; 1.2 Objectives of the Thesis; 1.3 Research Methodology; 1.3.1 Design Science; 1.3.2 Research Design; 1.3.3 Design Theory; 1.3.4 Theoretical Contribution and Research Outcome; 1.4 Practical Implications, Users, and Beneficiaries; 2 Healthcare Telematics in Germany with Respect to Security Issues; 2.1 German Healthcare; 2.1.1 Structure of German Healthcare; 2.1.2 Characteristics of the German Healthcare Sector; 2.1.2.1 Information Exchange and Distributed Information Flows in German HealthcareSystem
2.1.2.2 Current Problems2.1.2.3 Specifics of the German Healthcare Domain; 2.2 Information Systems in Healthcare; 2.2.1 Seamless Healthcare; 2.2.2 Interoperability, Standards and Standardization Approaches in Healthcare; 2.2.2.1 Communication Standards; 2.2.2.2 Documentations Standards and Standardization Approaches; 2.2.3 Healthcare IS Architecture Types; 2.2.3.1 Monolithic System; 2.2.3.2 Heterogeneous System; 2.2.3.3 Service-Oriented IS Architecture; 2.2.4 Implications for Security Issues of Healthcare Information Systems; 2.3 Healthcare Telematics
2.3.1 Definitions and Objectives of Healthcare Telematics2.3.2 German Healthcare Telematics; 2.3.2.1 Healthcare Telematics Infrastructure; 2.3.2.2 Electronic Health Card; 2.3.3 Risk and Security Issues of Healthcare Telematics; 2.4 Summary; 3 Catalogue of IS Healthcare Security Characteristics; 3.1 Legal Framework; 3.1.1 Privacy; 3.1.2 Legal Requirements; 3.2 Protection Goals; 3.2.1 Dependable Healthcare Information Systems; 3.2.2 Controllability of Healthcare Information Systems; 3.3 Characteristics of IS Security Approaches with Respect to Healthcare; 3.3.1 Literature Review
3.3.2 Overview of Healthcare IS Security Approach Characteristics3.3.2.1 General IS Security Approach Characteristics; 3.3.2.2 General IS Security Approach Characteristics with Reference to Healthcare; 3.4 Summary; 4 Analysis of IS Security Analysis Approaches; 4.1 Overview; 4.2 Review of Literature; 4.3 Existing Literature Reviews; 4.4 Theoretical Background; 4.5 Systematization of IS Security Analysis Approaches; 4.5.1 Checklists; 4.5.2 Assessment Approaches; 4.5.2.1 Risk Assessment Approaches; 4.5.2.2 Security Control Assessment Approaches; 4.5.3 Risk Analysis Approaches
4.5.4 IT Security Management Approaches4.5.4.1 The Plan-Do-Check-Act Approach of ISO 27001; 4.5.4.2 Best Practice Models; 4.5.5 Legislation Accommodations; 4.6 Analysis of IS Security Analysis Approaches with Respect to Healthcare; 4.6.1 Examination of IS Security Approaches with Respect to General IS Security Approach Characteristics; 4.6.2 Examination of IS Security Approaches with Respect to General IS Security Approach Characteristics with Reference to Healthcare; 4.6.3 Examination of IS Security Approaches with Respect to Healthcare Specific IS Security Approach Characteristics
4.7 Summary
ISBN: 978-3-8349-6519-6 ; 978-3-8349-2442-1
Other identifiers:
10.1007/978-3-8349-6519-6 [DOI]
Classification: Medizinische Mathematik, medizinische Statistik ; Computersicherheit
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10014015296