Design and Development of Information Sharing and Analysis Center (ISAC) as an Information Sharing Platform

Author(s):  
Intan Maratus Sholihah ◽  
Hermawan Setiawan ◽  
Olga Geby Nabila
2017 ◽  
Vol 51 (s6) ◽  
pp. 19-25 ◽  
Author(s):  
Mike Busdicker ◽  
Priyanka Upendra

Abstract: This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.


2021 ◽  
Vol 65 (191) ◽  
pp. 95-102
Author(s):  
Marek Pawlik

European Commission has published a nearly 50-page-long document on cybersecurity in transport called the Transport cybersecurity toolkit. As part of the work of ISAC-Kolej (the Information Sharing and Analysis Center for the railway trans-port sub-sector), guidelines in terms of cybersecurity for the employees of the railway entities have been developed and adopted. This article briefly discusses the European and Polish activities taken in order to protect railway transport against cyberthreats and shares the guidelines for employees adopted by ISAC-Kolej. Considering the increasingly widespread use of digital solutions, both for supporting operations of the business entities that constitute the railway system and for rail-way traffic management and supervision, these guidelines should be disseminated to the maximum possible extent among railway employees that use computers in their work. Keywords: information systems (IT), operational systems (OT), cybersecurity


2013 ◽  
Vol 846-847 ◽  
pp. 1805-1808
Author(s):  
Yi Lin ◽  
Qing Yun Shou ◽  
Hui Ping Si ◽  
Jun Gao ◽  
Feng Wang

Form 2004, Shanghai has started the corresponding Science and technology support program for the construction of Chongming eco-island. With eight years of continuous special support, it has a series of noticeable effects. Facing the problem of asymmetry of Sci-techl information, inability to realize Sci-Tech data compilation and sharing, and slowness of transferring scientific achievement into productivity, to establish a Sci-tech information sharing platform is very important for realizing the technical swift communication and authentic sharing. This study elaborated the design and development of the platform, the establishment of the database, the visual query and browsing technique, application of WebGIS and platform safety strategy. The Sic-tech information sharing platform includes all Sic-tech projects of Chongming special fund and all corresponding key technology and results based on Web page. Meanwhile, it provides strong related search functions for different users. The platform has entered a practical using and comes into great effect gradually.


2014 ◽  
Vol 945-949 ◽  
pp. 1681-1685
Author(s):  
Ling Hui Wei ◽  
Jun Huang ◽  
Hong Hai Xu

The availability Research of heavy CNC Equipment is based on the equipment life cycle process from design, manufacture, production and assembly to run, involves cooperation process and information exchange timely among availability research institute, equipment manufacturers and multi-class equipment users, combine network and database techniques, build high-level platforms for information exchange and management, broaden cooperation field and ensure accuracy for original information timely. Moreover, multi-class users can complete certain task together with the help of fault information collected, equipment improvement, information-sharing and issues discussed.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Alain Mermoud ◽  
Marcus Matthias Keupp ◽  
Kévin Huguenin ◽  
Maximilian Palmié ◽  
Dimitri Percia David

Abstract Security information sharing (SIS) is an activity whereby individuals exchange information that is relevant to analyze or prevent cybersecurity incidents. However, despite technological advances and increased regulatory pressure, individuals still seem reluctant to share security information. Few contributions have addressed this conundrum to date. Adopting an interdisciplinary approach, our study proposes a behavioral framework that theorizes how and why human behavior and SIS may be associated. We use psychometric methods to test these associations, analyzing a unique sample of human Information Sharing and Analysis Center members who share real security information. We also provide a dual empirical operationalization of SIS by introducing the measures of SIS frequency and intensity. We find significant associations between human behavior and SIS. Thus, the study contributes to clarifying why SIS, while beneficial, is underutilized by pointing to the pivotal role of human behavior for economic outcomes. It therefore extends the growing field of the economics of information security. By the same token, it informs managers and regulators about the significance of human behavior as they propagate goal alignment and shape institutions. Finally, the study defines a broad agenda for future research on SIS.


Sign in / Sign up

Export Citation Format

Share Document