By Topic

Computer security when data = life

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Camp, J. ; Harvard University

Security technologies were born of and initially implemented in a business, social and technical structure based on fundamental assumptions which no longer hold in health care. Thus, while computer security has much to offer health care, utilizing the full potential of computer security technologies with respect to patient information requires reevaluating priorities in computer security. Such a reevaluation requires defining the traditional goals of computer security. There are a number of tradeoffs inherent in the goals of computer security, for example information which is highly available is less confidential. Security is a multidimensional problem which must be solved with respect to the specific problem, not a generic technical add-on which can be added to any system. This paper presents two contrasting cases where distinctly different approaches to risk and security in patient information systems are taken.

Published in:

Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on

Date of Conference:

9-10 Nov. 2000