Extent: | Online-Ressource (XX, 271p. 60 illus, digital) |
---|---|
Series: | |
Type of publication: | Book / Working Paper |
Language: | English |
Notes: | Includes bibliographical references Foreword; Abstract; Contents; List of Figures; List of Tables; 1 Introduction; 1.1 Motivation; 1.2 Objectives of the Thesis; 1.3 Research Methodology; 1.3.1 Design Science; 1.3.2 Research Design; 1.3.3 Design Theory; 1.3.4 Theoretical Contribution and Research Outcome; 1.4 Practical Implications, Users, and Beneficiaries; 2 Healthcare Telematics in Germany with Respect to Security Issues; 2.1 German Healthcare; 2.1.1 Structure of German Healthcare; 2.1.2 Characteristics of the German Healthcare Sector; 2.1.2.1 Information Exchange and Distributed Information Flows in German HealthcareSystem 2.1.2.2 Current Problems2.1.2.3 Specifics of the German Healthcare Domain; 2.2 Information Systems in Healthcare; 2.2.1 Seamless Healthcare; 2.2.2 Interoperability, Standards and Standardization Approaches in Healthcare; 2.2.2.1 Communication Standards; 2.2.2.2 Documentations Standards and Standardization Approaches; 2.2.3 Healthcare IS Architecture Types; 2.2.3.1 Monolithic System; 2.2.3.2 Heterogeneous System; 2.2.3.3 Service-Oriented IS Architecture; 2.2.4 Implications for Security Issues of Healthcare Information Systems; 2.3 Healthcare Telematics 2.3.1 Definitions and Objectives of Healthcare Telematics2.3.2 German Healthcare Telematics; 2.3.2.1 Healthcare Telematics Infrastructure; 2.3.2.2 Electronic Health Card; 2.3.3 Risk and Security Issues of Healthcare Telematics; 2.4 Summary; 3 Catalogue of IS Healthcare Security Characteristics; 3.1 Legal Framework; 3.1.1 Privacy; 3.1.2 Legal Requirements; 3.2 Protection Goals; 3.2.1 Dependable Healthcare Information Systems; 3.2.2 Controllability of Healthcare Information Systems; 3.3 Characteristics of IS Security Approaches with Respect to Healthcare; 3.3.1 Literature Review 3.3.2 Overview of Healthcare IS Security Approach Characteristics3.3.2.1 General IS Security Approach Characteristics; 3.3.2.2 General IS Security Approach Characteristics with Reference to Healthcare; 3.4 Summary; 4 Analysis of IS Security Analysis Approaches; 4.1 Overview; 4.2 Review of Literature; 4.3 Existing Literature Reviews; 4.4 Theoretical Background; 4.5 Systematization of IS Security Analysis Approaches; 4.5.1 Checklists; 4.5.2 Assessment Approaches; 4.5.2.1 Risk Assessment Approaches; 4.5.2.2 Security Control Assessment Approaches; 4.5.3 Risk Analysis Approaches 4.5.4 IT Security Management Approaches4.5.4.1 The Plan-Do-Check-Act Approach of ISO 27001; 4.5.4.2 Best Practice Models; 4.5.5 Legislation Accommodations; 4.6 Analysis of IS Security Analysis Approaches with Respect to Healthcare; 4.6.1 Examination of IS Security Approaches with Respect to General IS Security Approach Characteristics; 4.6.2 Examination of IS Security Approaches with Respect to General IS Security Approach Characteristics with Reference to Healthcare; 4.6.3 Examination of IS Security Approaches with Respect to Healthcare Specific IS Security Approach Characteristics 4.7 Summary |
ISBN: | 978-3-8349-6519-6 ; 978-3-8349-2442-1 |
Other identifiers: | 10.1007/978-3-8349-6519-6 [DOI] |
Classification: | Medizinische Mathematik, medizinische Statistik ; Computersicherheit |
Source: | ECONIS - Online Catalogue of the ZBW |
Persistent link: https://www.econbiz.de/10014015296