Methodology for determining actual threats to information security in medical information system

In this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI w...

Full description

Saved in:
Bibliographic Details
Main Authors: V. A. Maystrenko, O. A. Bezrodnykh, R. A. Dorokhin
Format: Article
Language:English
Published: Omsk State Technical University, Federal State Autonoumos Educational Institution of Higher Education 2021-11-01
Series:Омский научный вестник
Subjects:
Online Access:https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832572410408206336
author V. A. Maystrenko
O. A. Bezrodnykh
R. A. Dorokhin
author_facet V. A. Maystrenko
O. A. Bezrodnykh
R. A. Dorokhin
author_sort V. A. Maystrenko
collection DOAJ
description In this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI when creating MIS that process personal data using a specific technology of expert assessment are considered. The proposed methodology for determining actual threats to information security for MIS, in comparison with those used, eliminates subjective assessments that are a characteristic feature of traditional expert assessments. Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. The authors investigate the practical possibilities of using the theory of fuzzy sets and fuzzy logic in determining the actual UBI for MIS for various purposes.
format Article
id doaj-art-5d1fcb060e754eb6b77cf08e45ecc5d6
institution Kabale University
issn 1813-8225
2541-7541
language English
publishDate 2021-11-01
publisher Omsk State Technical University, Federal State Autonoumos Educational Institution of Higher Education
record_format Article
series Омский научный вестник
spelling doaj-art-5d1fcb060e754eb6b77cf08e45ecc5d62025-02-02T10:00:56ZengOmsk State Technical University, Federal State Autonoumos Educational Institution of Higher EducationОмский научный вестник1813-82252541-75412021-11-015 (179)747910.25206/1813-8225-2021-179-74-79Methodology for determining actual threats to information security in medical information systemV. A. Maystrenko0https://orcid.org/0000-0002-8785-1339O. A. Bezrodnykh1R. A. Dorokhin2Omsk State Technical UniversityOmsk State Technical UniversityBauman Moscow State Technical UniversityIn this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI when creating MIS that process personal data using a specific technology of expert assessment are considered. The proposed methodology for determining actual threats to information security for MIS, in comparison with those used, eliminates subjective assessments that are a characteristic feature of traditional expert assessments. Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. The authors investigate the practical possibilities of using the theory of fuzzy sets and fuzzy logic in determining the actual UBI for MIS for various purposes.https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdfmedical information systemtypes of medical information systemspersonal data protectionfuzzy logicfuzzy assessment
spellingShingle V. A. Maystrenko
O. A. Bezrodnykh
R. A. Dorokhin
Methodology for determining actual threats to information security in medical information system
Омский научный вестник
medical information system
types of medical information systems
personal data protection
fuzzy logic
fuzzy assessment
title Methodology for determining actual threats to information security in medical information system
title_full Methodology for determining actual threats to information security in medical information system
title_fullStr Methodology for determining actual threats to information security in medical information system
title_full_unstemmed Methodology for determining actual threats to information security in medical information system
title_short Methodology for determining actual threats to information security in medical information system
title_sort methodology for determining actual threats to information security in medical information system
topic medical information system
types of medical information systems
personal data protection
fuzzy logic
fuzzy assessment
url https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdf
work_keys_str_mv AT vamaystrenko methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem
AT oabezrodnykh methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem
AT radorokhin methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem