Modelling Context-Aware Security for Electronic Health Records

Modelling Context-Aware Security for Electronic Health Records

Pravin Shetty, Seng Loke
Copyright: © 2007 |Pages: 7
ISBN13: 9781591409878|ISBN10: 159140987X|EISBN13: 9781591409885
DOI: 10.4018/978-1-59140-987-8.ch069
Cite Chapter Cite Chapter

MLA

Shetty, Pravin, and Seng Loke. "Modelling Context-Aware Security for Electronic Health Records." Encyclopedia of Information Ethics and Security, edited by Marian Quigley, IGI Global, 2007, pp. 463-469. https://doi.org/10.4018/978-1-59140-987-8.ch069

APA

Shetty, P. & Loke, S. (2007). Modelling Context-Aware Security for Electronic Health Records. In M. Quigley (Ed.), Encyclopedia of Information Ethics and Security (pp. 463-469). IGI Global. https://doi.org/10.4018/978-1-59140-987-8.ch069

Chicago

Shetty, Pravin, and Seng Loke. "Modelling Context-Aware Security for Electronic Health Records." In Encyclopedia of Information Ethics and Security, edited by Marian Quigley, 463-469. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-987-8.ch069

Export Reference

Mendeley
Favorite

Abstract

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.