ANALYSIS OF THE IMPACT OF RELIABILITY INDICATORS EQUIPMENT OF SITUATION CENTERS ON INFORMATION SECURITY

Author(s):  
Russell Cameron Thomas ◽  
Marcin Antkiewicz ◽  
Patrick Florer ◽  
Suzanne Widup ◽  
Matthew Woodyard

2020 ◽  
Author(s):  
Ke Zeng ◽  
Weiguo Zhu ◽  
Caiyou Wang ◽  
Liyan Zhu

BACKGROUND The rapid spread of COVID-19 has created a severe challenge to China’s healthcare system. Hospitals across the country reacted quickly under the leadership of the Chinese government and implemented a range of informatization measures to effectively respond to the COVID-19. OBJECTIVE To understand the impact of the pandemic on the medical business of Chinese hospitals and the difficulties faced by hospital informatization construction. To discuss the application of hospital informatization measures during the COVID-19 pandemic. To summarize the practical experience of hospitals using information technology to fight the pandemic. METHODS Performing a cross-sectional on-line questionnaire survey in Chinese hospitals, of which the participants are invited including hospital information staff, hospital administrators, medical staff, etc. Statistical analyzing the collected data by using SPSS version 24. RESULTS A total of 804 valid questionnaires (88.45%) are collected in this study from 30 provinces in mainland China, of which 731 (90.92%) were filled out by hospital information staff. 473 (58.83%) hospitals are tertiary hospitals while the remaining 331 (41.17%) are secondary hospitals. The majority hospitals (82.46%) had a drop in their business volume during the pandemic and a more substantial drop is found in tertiary hospitals. 70.40% (n=566) of hospitals have upgraded or modified their information systems in response to the epidemic. The proportion of tertiary hospitals that upgraded or modified systems is significantly higher than that of secondary hospitals. Internet hospital consultation (70.52%), pre-check and triage (62.56%), telemedicine (60.32%), health QR code (57.71%), and telecommuting (50.87%) are the most used informatization anti-pandemic measures. There are obvious differences in the application of information measures between tertiary hospitals and secondary hospitals. Among these measures, most of them (41.17%) are aiming at serving patients and most of them (62.38%) are universal which continue to be used after pandemic. The informatization measures are mostly used to control the source of infection (48.19%), such as health QR Code, etc. During the pandemic, the main difficulties faced by the hospital information department are “information construction projects are hindered” (58.96%) and “increased difficulty in ensuring network information security” (58.58%). There are significant differences in this issue between tertiary hospitals and secondary hospitals. The shortcomings of hospital informatization that should be made up for are “shorten patient consultation time and optimize consultation process” (72.51%), “Ensure network information security” (72.14%) and “build internet hospital consultations platform” (59.95%). CONCLUSIONS A significant number of innovative medical information technology have been used and played a significant role in all phases of COVID-19 prevention and control in China. Since the COVID-19 brought many challenges and difficulties for informatization work, hospitals need to constantly improve their own information technology skills to respond to public health emergencies that arise at any moment.


2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

With the rapid development of information technology, information security has been gaining attention. The International Organization for Standardization (ISO) has issued international standards and technical reports related to information security, which are gradually being adopted by enterprises. This study analyzes the relationship between information security certification (ISO 27001) and corporate financial performance using data from Chinese publicly listed companies. The study focusses on the impact of corporate decisions such as whether to obtain certification, how long to hold certification, and whether to publicize information regarding certification. The results show that there is a positive correlation between ISO 27001 and financial performance. Moreover, the positive impact of ISO 27001 on financial performance gradually increases with time. In addition, choosing not to publicize ISO 27001 certification can negatively affect enterprise performance.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2019 ◽  
Vol 2 (1) ◽  
pp. 1-7
Author(s):  
CITRA ARFANUDIN ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region. Security Information and Event Management (SIEM) is a security technology to secure information assets. SIEM is expected to provide information on attacks that occur on the router network and increase the value of the Indeks KAMI of government agencies. However, the use of SIEM is still questionable whether it can recognize a router attack and its impact on the value of our index. This research simulates attacks on routers with 8 attacks namely Mac Flooding, ARP-Poisoning, CDP Flooding, DHCP Starvation, DHCP Rogue, SYN Flooding SSH Bruteforce and FTP Bruteforce. 8 types of attacks followed by digital forensic analysis using the OSCAR method to see the impact on routers and SIEM. Also measured is index KAMI before and after the SIEM to be able to measure the effect of SIEM installation on the value of index KAMI. It was found that the use of SIEM to conduct security monitoring proved successful in identifying attacks, but not all were recognized by SIEM. SIEM only recognizes DHCP Starvation, DHCP Rogue, SSH Bruteforce and FTP Bruteforce. Mac Flooding, ARP-Poisoning, CDP Flooding, SYN Flooding attacks are not recognized by SIEM because routers do not produce logs. Also obtained is the use of SIEM proven to increase our index from the aspect of technology


2019 ◽  
pp. 29-44
Author(s):  
Vladlena Vyacheslavovna Lozben ◽  
Luybov Vadimovna Gajkova

In today’s environment, information security needs constant improvement. Therefore, biometric technologies are becoming increasingly important as a key area of information protection, contributing to the widespread introduction of biometric systems across firms and organizations. Purpose: in the course of handwriting research, human participation is a prerequisite for handwriting expertise, which entails certain problems in the field of biometric expertise, the emphasis on which is contained in the article. Methodology: tools and methods are considered to reduce the impact of problems on the process of handwriting examination: popular scientific methods of phase and case analysis and synthesis; Mathematical and simulation modeling methods and tools. Results: in order to identify approaches to reducing subjectivity of expert’s conclusions, a review and analysis of existing solutions was carried out, as a result of which a comparative characteristic of approaches to solving the problem of handwriting examination was drawn up. Scope of results: the results of this study will help the organization’s leadership in information security.


2012 ◽  
Vol 02 (07) ◽  
pp. 21-28
Author(s):  
Maryam Mahdikhani ◽  
Asadolah Khahande Karnama ◽  
Milad Beirami

Electronic Business (e-Business) is revolutionizing the way of communication between Internal and external stakeholders in an organization. E-business can lead to competitive advantage and at the same time, increase profitability. There are several factors resulting on the success of e-business. One of the most important factors is Security. It is thus clear that information technology (IT) and the emerging e-business application and related to security are gaining a pivotal role in managing supply chain. This paper examines the impact of E-business on supply chain on information security aspect among other types of supply chains. The current paper reviews security and supply chain literatures and then investigates framework of information technology in supply chain management. Areas of supply chain which need security attention are then proposed in e-supply chain information security framework and this will be considered as a guideline for managers to find out if their e-supply chain network is secure enough. Through the paper, one realizes that Information Security in every information based-system will be vital.


Sign in / Sign up

Export Citation Format

Share Document