Methodology for determining actual threats to information security in medical information system
In this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI w...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Omsk State Technical University, Federal State Autonoumos Educational Institution of Higher Education
2021-11-01
|
Series: | Омский научный вестник |
Subjects: | |
Online Access: | https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832572410408206336 |
---|---|
author | V. A. Maystrenko O. A. Bezrodnykh R. A. Dorokhin |
author_facet | V. A. Maystrenko O. A. Bezrodnykh R. A. Dorokhin |
author_sort | V. A. Maystrenko |
collection | DOAJ |
description | In this article based on the processing of statistical data
from various electronic resources the most frequent
types of threats to information security (UBI) for medical
information systems (MIS) are identified and their
classification is carried out.
The issues of determining the actual UBI when creating
MIS that process personal data using a specific technology
of expert assessment are considered. The proposed
methodology for determining actual threats to information
security for MIS, in comparison with those used, eliminates
subjective assessments that are a characteristic feature
of traditional expert assessments. Its use also makes it
possible to assess the relevance of information security
threats for MIS that do not have qualified specialists in
the field of information security in the staff of a medical
institution, which is relevant for a large number of medical
institutions.
The authors investigate the practical possibilities of using
the theory of fuzzy sets and fuzzy logic in determining the
actual UBI for MIS for various purposes. |
format | Article |
id | doaj-art-5d1fcb060e754eb6b77cf08e45ecc5d6 |
institution | Kabale University |
issn | 1813-8225 2541-7541 |
language | English |
publishDate | 2021-11-01 |
publisher | Omsk State Technical University, Federal State Autonoumos Educational Institution of Higher Education |
record_format | Article |
series | Омский научный вестник |
spelling | doaj-art-5d1fcb060e754eb6b77cf08e45ecc5d62025-02-02T10:00:56ZengOmsk State Technical University, Federal State Autonoumos Educational Institution of Higher EducationОмский научный вестник1813-82252541-75412021-11-015 (179)747910.25206/1813-8225-2021-179-74-79Methodology for determining actual threats to information security in medical information systemV. A. Maystrenko0https://orcid.org/0000-0002-8785-1339O. A. Bezrodnykh1R. A. Dorokhin2Omsk State Technical UniversityOmsk State Technical UniversityBauman Moscow State Technical UniversityIn this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI when creating MIS that process personal data using a specific technology of expert assessment are considered. The proposed methodology for determining actual threats to information security for MIS, in comparison with those used, eliminates subjective assessments that are a characteristic feature of traditional expert assessments. Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. The authors investigate the practical possibilities of using the theory of fuzzy sets and fuzzy logic in determining the actual UBI for MIS for various purposes.https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdfmedical information systemtypes of medical information systemspersonal data protectionfuzzy logicfuzzy assessment |
spellingShingle | V. A. Maystrenko O. A. Bezrodnykh R. A. Dorokhin Methodology for determining actual threats to information security in medical information system Омский научный вестник medical information system types of medical information systems personal data protection fuzzy logic fuzzy assessment |
title | Methodology for determining actual threats to information security in medical information system |
title_full | Methodology for determining actual threats to information security in medical information system |
title_fullStr | Methodology for determining actual threats to information security in medical information system |
title_full_unstemmed | Methodology for determining actual threats to information security in medical information system |
title_short | Methodology for determining actual threats to information security in medical information system |
title_sort | methodology for determining actual threats to information security in medical information system |
topic | medical information system types of medical information systems personal data protection fuzzy logic fuzzy assessment |
url | https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdf |
work_keys_str_mv | AT vamaystrenko methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem AT oabezrodnykh methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem AT radorokhin methodologyfordeterminingactualthreatstoinformationsecurityinmedicalinformationsystem |