Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS"
written by Ahmad Bakhtiyari Shahri, Zuraini Ismail,
published by Journal of Information Security, Vol.3 No.2, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Verticals in 5G MEC-use cases and security challenges
2021
[2] Providing a rational conceptual model for classifying critical infrastructure cyber threats
2019
[3] PLASMA–Platform for Service Management in Digital Remote Maintenance Applications
2019
[4] Business continuity-inspired fuzzy risk assessment framework for hospital information systems
2019
[5] Comparative Analysis of Hospital Information Management Systems Among Healthcare Workers in Two Selected Hospitals in Kenya
2018
[6] Practical security aspects of the internet of things
Cybersecurity for Industry 4.0, 2017
[7] Secure IoT Devices for the Maintenance of Machine Tools
Procedia CIRP, 2017
[8] Designing and implementing an information accountability framework for usable and useful eHealth systems
2017
[9] Information security risk management for computerized health information systems in hospitals: a case study of Iran
Risk Management and Healthcare Policy, 2016
[10] Study to Identify Threats to Information Systems in Organizations and Possible Countermeasures through Policy Decisions and Awareness Programs to Ensure …
2016
[11] Study to identify threats to Information Systems in organizations and possible countermeasures through policy decisions and awareness programs to ensure the …
2016
[12] Security analysis of a patient monitoring system for the Internet of Things in eHealth
2015
[13] Оценка состояния защищенности данных организации в условиях возможности реализации угроз информационной безопасности
2015
[14] Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android
JMIR mHealth and uHealth, 2015
[15] Use of hospital management information systems among healthcare workers at Kenyatta national and Mater hospitals
Thesis, 2015
[16] Information Privacy Concerns in the Use of Social Media Among Healthcare Practitioners: A Systematic Literature Review
Advanced Science Letters, 2014
[17] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure
Electronic Markets, 2014
[18] Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
AB Shahri, Z Ismail, NZ Rahim, 2014
[19] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German …
Electronic Markets, 2014
[20] Privacy challenges in electronic medical records: A systematic review
Proceedings of the Knowledge …, 2014
[21] Security Effectiveness in Health Information System: Through Improving the Human Factors by Education and Training.
Australian Journal of Basic & Applied Sciences, 2012
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top