3 resultados para information systems security

em Repositório do ISCTE - Instituto Universitário de Lisboa


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The growing pressure to increase the quality of health services, as well as reducing costs, has caused healthcare organizations to increase the use of Information and Communication Technologies (ICT) through the development and adoption of Healthcare Information Systems (HIS). However, the need for exchange of information between HIS and between organizations has also increased, resulting in the problem of interoperability. This problem is considered complex, but the use of Service Oriented Architecture (SOA) appears as a good way to address this issue. This paper presents a systematic review, performed in order to find out how and in which contexts SOA is being used to ensure the interoperability of HIS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Assessment processes are essential to guarantee quality and continuous improvement of software in healthcare, as they measure software attributes in their lifecycle, verify the degree of alignment between the software and its objectives and identify unpredicted events. This article analyses the use of an assessment model based on software metrics for three healthcare information systems from a public hospital that provides secondary and tertiary care in the region of Ribeirão Preto. Compliance with the metrics was investigated using questionnaires in guided interviews of the system analysts responsible for the applications. The outcomes indicate that most of the procedures specified in the model can be adopted to assess the systems that serves the organization, particularly in the attributes of compatibility, reliability, safety, portability and usability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The popularization of software to mitigate Information Security threats can produce an exaggerated notion about its full effectiveness in the elimination of any threat. This situation can result reckless users behavior, increasing vulnerability. Based on behavioral theories, a theoretical model and hypotheses were developed to understand the extent to which human perception of threat, stress, control and disgruntlement can induce responsible behavior. A self-administered questionnaire was created and validated. The data were collected in Brazil, and complementary results regarding similar studies conducted in USA were found. The results show that there is influence of information security orientations provided by organizations in the perception about severity of the threat. The relationship between threat, effort, control and disgruntlement, and the responsible behavior towards information security was verified through linear regression. The contributions also involve relatively new concepts in the field and a new research instrument.