"A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS"
written by Ahmad Bakhtiyari Shahri, Zuraini Ismail,
published by Journal of Information Security, Vol.3 No.2, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Business continuity-inspired fuzzy risk assessment framework for hospital information systems
2019
[2] PLASMA–Platform for Service Management in Digital Remote Maintenance Applications
2019
[3] Comparative Analysis of Hospital Information Management Systems Among Healthcare Workers in Two Selected Hospitals in Kenya
2018
[4] Explore our sister journals here.
2018
[5] Designing and implementing an information accountability framework for usable and useful eHealth systems
2017
[6] Secure IoT Devices for the Maintenance of Machine Tools
Procedia CIRP, 2017
[7] Practical security aspects of the internet of things
Cybersecurity for Industry 4.0, 2017
[8] Information security risk management for computerized health information systems in hospitals: a case study of Iran
Risk Management and Healthcare Policy, 2016
[9] Study to identify threats to Information Systems in organizations and possible countermeasures through policy decisions and awareness programs to ensure the …
2016
[10] Study to Identify Threats to Information Systems in Organizations and Possible Countermeasures through Policy Decisions and Awareness Programs to Ensure …
2016
[11] Security analysis of a patient monitoring system for the Internet of Things in eHealth
2015
[12] Use of hospital management information systems among healthcare workers at Kenyatta national and Mater hospitals
Thesis, 2015
[13] Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android
JMIR mHealth and uHealth, 2015
[14] Оценка состояния защищенности данных организации в условиях возможности реализации угроз информационной безопасности
2015
[15] Cultivating of Human's Behavior Toward Security Effectiveness in Health Information System
AB Shahri, Z Ismail, NZ Rahim, 2014
[16] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German nationwide health information technology infrastructure
Electronic Markets, 2014
[17] Information Privacy Concerns in the Use of Social Media Among Healthcare Practitioners: A Systematic Literature Review
Advanced Science Letters, 2014
[18] Secure provision of patient-centered health information technology services in public networks—leveraging security and privacy features provided by the German …
Electronic Markets, 2014
[19] Security Effectiveness in Health Information System: Through Improving the Human Factors by Education and Training.
Australian Journal of Basic & Applied Sciences, 2012