Explore chapters and articles related to this topic
Privacy, Security, and Trust
Published in Julie A. Jacko, The Human–Computer Interaction Handbook, 2012
John Karat, Clare-Marie Karat, Carolyn Brodie
The group practice’s privacy policies cover their operational rules for disclosing information to healthcare professionals within the practice and in other organizations who are coordinating in the care of patients in the group practice, disclosure of information to insurance companies and national health center organizations, and the privacy policy preferences that the patients can set up for allowing access to the patient view of the medical file called MyMedicalFile. Similarly, the group practice has a set of security policies that it follows for both the hardcopy and electronic patient data. The database administrator for the group practice implements both the privacy and security policies for the MyMedicalFile electronic patient record system and coordinates with the office manager on the implementation of privacy and security policies for hardcopy data within the group practice. The database administrator uses commercial security and privacy software with the MedicalFile application. The security software protects against unauthorized access. The privacy software controls access to patient data for different purposes and logs the access information. The doctor’s office has data retention policies for individually identifiable health information (IIHI) data and conducts periodic audits to ensure the accuracy of IIHI data in medical summaries and billings to insurance companies. The retention policy covers patients who move away or have died.
Securing Your Computers
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Antivirus software is a security software utility that is able to detect different types of viruses and malware programs on computers. It is also able to remove, delete, and quarantine a virus that has already affected the computer.
To what extent does time perspective predict online security behaviour?
Published in Behaviour & Information Technology, 2023
Most participants reported neither they (79%) nor a family member or a friend (60%) had been a victim of an online security breach. In terms of security behaviours (Table 2; Figure 1), mean scores, their confidence intervals and effect size of the mean2 compared with a neutral score (mid-scale value of 4 for CSU and 3 for the four SeBIS scales and the six-time perspective scales) show that the profile of the sample was mixed in terms of security behaviours. Device Securement had a large positive effect size and protecting own computer with technical measures (updating and computer security software use) had a small positive effect size, while both confidence intervals did not include the mid-scale value; in other words, the extent to which participants engaged in these behaviours was above average. Password generation had a small negative effect size, with a confidence interval not including the mid-scale value; in other words, the extent to which participants engaged in these behaviours was below average. Proactive Awareness and Updating had a negligible effect size, both with a confidence interval including the mid-scale value; therefore, the extent to which participants engaged in these behaviours was not distinguishable from average.
Security Awareness: The First Step in Information Security Compliance Behavior
Published in Journal of Computer Information Systems, 2021
Inho Hwang, Robin Wakefield, Sanghyun Kim, Taeha Kim
The results of analyses indicate information security awareness occurs when employees are exposed to security education, security policy, security visibility and management security participation. Interestingly, a physical security system was not significantly related to awareness. We surmise security hardware, software and other means of information access prevention are not observed by employees if they exist in the background, unnoticed (e.g. Symantec security software, off-premise hardware), may not be associated with information security (e.g. locked computer room) or inaccessible to employees (e.g., data center). Logically, awareness would occur with the explicit association of physical security system hardware, software, and procedures with the attainment of security knowledge. Additionally, our items measuring a physical security system focused on perceptions of organizational investment rather than specific information security components. Nonetheless, we believe this result is informative. It suggests a security-related stimulus that is vague or elusive in its relationship to information security may not be adequate to elicit awareness.
Privacy and security in the big data paradigm
Published in Journal of Computer Information Systems, 2020
Zhaohao Sun, Kenneth David Strang, Francisca Pambel
Based on the 2012 ACM Computing Classification System55, 56, privacy and security have been formed into a three-level tree. For example, privacy and security–Cryptography–Key management, where privacy and security is the first-level node, cryptography is the second level node, directly linking the first-level node, and key management is the third node linking the second node, Cryptography. Now privacy and security are illustrated using the two-level structure using Table2 (first column), that is, the second-level topics (eight nodes) of privacy and security consist of Cryptography, Formal methods and theory of security, Security services, Intrusion/anomaly detection and malware mitigation, Security in hardware, Systems security, Network security, Database and storage security, Software and application security, and Human and societal aspects of security and privacy.