Learn More
This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the(More)
The purpose of this paper is to identify the threats that exist in Healthcare Information Systems (HIS). The study has been carried out in three different departments namely, Information Technology Department (ITD), Medical Record Department (MRD) and X-Ray Department in one of the leading government supported hospital in Malaysia. The hospital was equipped(More)
The concerns in healthcare services is needed to deal with privacy and data security risks in handling electronic healthcare records (EHR). With the limitation of the existing literature dealing with number of factors that influence information privacy concerns in EHR, the main objective of this study is to review recent studies on information privacy(More)
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies(More)
In order to attain a world class e-government service delivery, the implementation of Enterprise Architecture (EA) is highly recommended to reflect efficient and effective public service delivery. However, agency readiness to embrace and sustain EA practices remains a concern. The aims of this research are i) to identify available mechanisms in measuring(More)
The term " Cloud Computing " has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been(More)
Nowadays, organizations discover that it is essential to protect their information, and adopt several approaches in protecting their valuable information and internal resources from unauthorized access. Network Intrusion Detection System is one type of tools that computer security administrators may use to perform network monitoring, and analyze whether(More)