Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw Dec 2014

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw

Australian eHealth Informatics and Security Conference

Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …


Help Or Hindrance: The Practicality Of Applying Security Standards In Healthcare, Patricia A H Williams Jan 2011

Help Or Hindrance: The Practicality Of Applying Security Standards In Healthcare, Patricia A H Williams

Australian Information Security Management Conference

The protection of patient information is now more important as a national e-health system approaches reality in Australia. The major challenge for health care providers is to understand the importance information security whilst also incorporating effective protection into established workflow and daily activity. Why then, when it is difficult for IT and security professionals to navigate through and apply the myriad of information security standards, do we expect small enterprises such as primary health care providers to also be able to do this. This is an onerous and impractical task without significant assistance. In the development of the new Computer …


The Need For An Investigation Into Possible Security Threats Associated With Sql Based Emr Software, Lee Heinke Dec 2007

The Need For An Investigation Into Possible Security Threats Associated With Sql Based Emr Software, Lee Heinke

Australian Information Security Management Conference

An increasing amount of E-health software packages are being bundled with Standard Query Language (SQL) databases as a means of storing Electronic Medical Records (EMR’s). These databases allow medical practitioners to store, change and maintain large volumes of patient information. The software that utilizes these databases pulls data directly from fields within the database based on standardized query statements. These query statements use the same methods as web-based applications to dynamically pull data from the database so it can be manipulated by the Graphical User Interface (GUI). This paper proposes a study for an investigation into the susceptibility of popular …


Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb Dec 2007

Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb

Australian Information Security Management Conference

Hospital and general practice healthcare providers today rely heavily on the information and communication technologies they employ to provide access to patient and associated data. The continuing migration to wireless means of data transfer has afforded system users more convenient and timely access to information via the use of 802.11 based wireless network capable devices. Through the increased digital connectivity of these internet and wireless based networks, new avenues of criminal activity such as medical identity theft have been steadily increasing as malicious individuals and organisations seek to abuse the digital ubiquity of the electronic medical record. The increased need …


It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli Jan 2007

It Sharps: Issues Relating To Securely Disposing Of Hard Disks From Medical Information Systems, Craig Valli

Research outputs pre 2011

Organisations worldwide are failing to adequately erase data from hard disks before disposing of them. Recent studies have uncovered significant and highly confidential data from computer hard disks for sale in the second hand market using minimal foresic recovery techniques. Increasingly medical businesses are being required to use IT based systems to deliver or receive services. Also medical records are becoming electronic in nature and have significant secondary storage requirements. Given the increased use of IT in medical practice this paper examines the issues uncovered in the studies into recovery of remnant data from hard disks. The paper also explores …


The Insider Threat To Medical Records: Has The Network Age Changed Anything?, Craig Valli Jan 2006

The Insider Threat To Medical Records: Has The Network Age Changed Anything?, Craig Valli

Research outputs pre 2011

There is increasing pressure on medical practices to use digital information systems for storage of patient data. Some consideration is given to protecting these systems from a external or “ hacker” focus. This paper looks at the issue that the increasing use of digital information systems has for insider malfeasance.


Sql Injection - Threats To Medical Systems: The Issues And Countermeasures, Craig Valli Jan 2006

Sql Injection - Threats To Medical Systems: The Issues And Countermeasures, Craig Valli

Research outputs pre 2011

A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manner. SQL is a standardised and well entrenched database technology, which allows for the development of robust, customised applications for information management. In recent years, SQL has been used as the back-end to many successful web client accessible applications. The use of SQL in this manner has been greatly enhanced through the development of server side scripting languages such as Microsoft ASP and open source systems such as PHP. These allow for the representation …