{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2021-09-25T11:07:51.011576+00:00", "custom_fields": { "journal:journal": { "issue": "1", "pages": "170-177", "title": "International Journal of Engineering and Advanced Technology (IJEAT)", "volume": "10" }, "legacy:subjects": [ { "identifier": "2249-8958", "scheme": "issn", "term": "ISSN" }, { "identifier": ": 100.1/ijeat.A16911010120", "scheme": "handle", "term": "Retrieval Number" } ] }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "A16911010120.pdf": { "checksum": "md5:e948e5b0bdca17d5aeb46295208bc8b9", "ext": "pdf", "id": "6e9aaba2-258e-4b56-9f6a-d00b983a6994", "key": "A16911010120.pdf", "metadata": null, "mimetype": "application/pdf", "size": 336206 } }, "order": [], "total_bytes": 336206 }, "id": "5527859", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/5527859/access", "access_links": "https://zenodo.org/api/records/5527859/access/links", "access_request": "https://zenodo.org/api/records/5527859/access/request", "access_users": "https://zenodo.org/api/records/5527859/access/users", "archive": "https://zenodo.org/api/records/5527859/files-archive", "archive_media": "https://zenodo.org/api/records/5527859/media-files-archive", "communities": "https://zenodo.org/api/records/5527859/communities", "communities-suggestions": "https://zenodo.org/api/records/5527859/communities-suggestions", "doi": "https://doi.org/10.35940/ijeat.A1691.1010120", "draft": "https://zenodo.org/api/records/5527859/draft", "files": "https://zenodo.org/api/records/5527859/files", "latest": "https://zenodo.org/api/records/5527859/versions/latest", "latest_html": "https://zenodo.org/records/5527859/latest", "media_files": "https://zenodo.org/api/records/5527859/media-files", "parent": "https://zenodo.org/api/records/5527858", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/5527858", "requests": "https://zenodo.org/api/records/5527859/requests", "reserve_doi": "https://zenodo.org/api/records/5527859/draft/pids/doi", "self": "https://zenodo.org/api/records/5527859", "self_doi": "https://zenodo.org/doi/10.35940/ijeat.A1691.1010120", "self_html": "https://zenodo.org/records/5527859", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:5527859/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:5527859/sequence/default", "versions": "https://zenodo.org/api/records/5527859/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Publisher" } ], "person_or_org": { "family_name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "name": "Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)", "type": "personal" }, "role": { "id": "sponsor", "title": { "de": "Sponsor", "en": "Sponsor" } } } ], "creators": [ { "affiliations": [ { "name": "Faculty of Computing, Botho University, Gaborone, Botswana" } ], "person_or_org": { "family_name": "Amarendar Rao Thangeda", "name": "Amarendar Rao Thangeda", "type": "personal" } }, { "affiliations": [ { "name": "Computer Science Department, University of South Africa, Pretoria, South Africa," } ], "person_or_org": { "family_name": "Alfred Coleman", "name": "Alfred Coleman", "type": "personal" } } ], "description": "
Information and risk analysis in healthcare system is an important issue in the modern technological growth. There are many systems implemented for information security and risk management for information protection. Proper guidance is needed to select the system as all the systems concentrate on information security of healthcare system. The information threats and risk are increasing, and all the issues are integrated to the vulnerabilities producing risk for the healthcare security. The healthcare system process structure and variation are advocated, in which operating performance indication is based on risk scaling factor so that dynamic information security risk analysis is needed. This paper is proposed for information security risk analysis in which the resources, risk threats, vulnerabilities that control the healthcare system. The paper compares the various inputs and outputs are needed by different systems of information security risk assessment and analysis that accurately presents the information security risk. At present, large number of information security risk analysis methodologies are present in the worldwide. Important and efficient methodologies are considered for comparison and quantitative purpose to choose most suitable methodology for healthcare system.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2020-10-30", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "2249-8958", "relation_type": { "id": "iscitedby", "title": { "de": "Wird zitiert von", "en": "Is cited by" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "issn" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Information security risk analysis, healthcare security system, risk assessment, risk threats, risk vulnerabilities" } ], "title": "Information Security Risk Analysis Methods for Healthcare Systems" }, "parent": { "access": { "owned_by": { "user": 251627 } }, "communities": {}, "id": "5527858", "pids": {} }, "pids": { "doi": { "identifier": "10.35940/ijeat.A1691.1010120", "provider": "external" }, "oai": { "identifier": "oai:zenodo.org:5527859", "provider": "oai" } }, "revision_id": 2, "stats": { "all_versions": { "data_volume": 19836154.0, "downloads": 59, "unique_downloads": 59, "unique_views": 39, "views": 44 }, "this_version": { "data_volume": 19836154.0, "downloads": 59, "unique_downloads": 59, "unique_views": 39, "views": 44 } }, "status": "published", "updated": "2021-09-25T13:48:25.023922+00:00", "versions": { "index": 1, "is_latest": true } }