4.3 Article

Privacy, security and resilience in mobile healthcare applications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Information Systems

Dying of a hundred good symptoms: why good security can still fail-a literature review and analysis

Paul Loft et al.

Summary: Despite positive steps towards achieving good security standards, many organizations still suffer serious information security incidents, often due to security arrangements not being sufficiently integrated with businesses. Adopting an Enterprise Architecture (EA) approach, known as 'Enterprise Information Security Architecture' (EISA), can deliver substantial benefits in implementing information security. Our paper reviews literature on root causes of information security incidents and presents a novel approach with 8 domains for building an EISA framework that considers critical factors.

ENTERPRISE INFORMATION SYSTEMS (2021)

Article Computer Science, Interdisciplinary Applications

Exploring the intellectual cores of the blockchain-Internet of Things (BIoT)

Y. P. Tsang et al.

Summary: This study examines the intellectual core of BIoT using a co-citation proximity analysis-based systematic review, identifying nine categories within the core and providing a structural framework for further research in this underexplored area.

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2021)

Review Computer Science, Information Systems

An exhaustive survey on security and privacy issues in Healthcare 4.0

Jigna J. Hathaliya et al.

COMPUTER COMMUNICATIONS (2020)

Review Computer Science, Interdisciplinary Applications

Industry 4.0 and Health: Internet of Things, Big Data, and Cloud Computing for Healthcare 4.0

Giuseppe Aceto et al.

JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2020)

Article Health Care Sciences & Services

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment

Jalal Al-Muhtadi et al.

HEALTH INFORMATICS JOURNAL (2019)

Article Computer Science, Information Systems

Patient assignment scheduling in a cloud healthcare system based on petri net and greedy-based heuristic

Yafei Li et al.

ENTERPRISE INFORMATION SYSTEMS (2019)

Editorial Material Computer Science, Information Systems

Integrated design and operation management for enterprise systems

W. J. Zhang et al.

ENTERPRISE INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

A semantic similarity analysis of Internet of Things

Chun Kit Ng et al.

ENTERPRISE INFORMATION SYSTEMS (2018)

Article Computer Science, Interdisciplinary Applications

Management of a holistic supply chain network for proactive resilience: Theory and case study

Junwei Wang et al.

COMPUTERS & INDUSTRIAL ENGINEERING (2018)

Article Business

Blockchain technology for providing an architecture model of decentralized personal health information

Sandi Rahmadika et al.

INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT (2018)

Editorial Material Computer Science, Information Systems

Design theory and methodology for enterprise systems

W. J. Zhang et al.

ENTERPRISE INFORMATION SYSTEMS (2016)

Article Engineering, Electrical & Electronic

On Service Resilience in Cloud-Native 5G Mobile Systems

Tarik Taleb et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2016)

Review Computer Science, Information Systems

Toward a Resilient Holistic Supply Chain Network System: Concept, Review and Future Direction

Junwei Wang et al.

IEEE SYSTEMS JOURNAL (2016)

Article Materials Science, Multidisciplinary

Axiomatic design theory: further notes and its guideline to applications

L. X. Fan et al.

INTERNATIONAL JOURNAL OF MATERIALS & PRODUCT TECHNOLOGY (2015)

Article Engineering, Industrial

Four concepts for resilience and the implications for the future of resilience engineering

David D. Woods

RELIABILITY ENGINEERING & SYSTEM SAFETY (2015)

Article Computer Science, Hardware & Architecture

Securing m-healthcare social networks: challenges, countermeasures and future directions

Jun Zhou et al.

IEEE WIRELESS COMMUNICATIONS (2013)

Article Computer Science, Theory & Methods

Privacy in Mobile Technology for Personal Healthcare

Sasikanth Avancha et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Hardware & Architecture

ENABLING PERVASIVE HEALTHCARE THROUGH CONTINUOUS REMOTE HEALTH MONITORING

Xiaohui Liang et al.

IEEE WIRELESS COMMUNICATIONS (2012)

Article Engineering, Industrial

Toward a resilient manufacturing system

W. J. Zhang et al.

CIRP ANNALS-MANUFACTURING TECHNOLOGY (2011)

Article Computer Science, Information Systems

On the principle of design of resilient systems - application to enterprise information systems

W. J. Zhang et al.

ENTERPRISE INFORMATION SYSTEMS (2010)

Review Law

Conceptualizing privacy

DJ Solove

CALIFORNIA LAW REVIEW (2002)