Skip to main content

Research Repository

Advanced Search

Outputs (5)

Secret shares to protect health records in Cloud-based infrastructures (2016)
Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). https://doi.org/10.1109/HealthCom.2015.7454589

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society (2014)
Thesis
van Deursen Hazelhoff Roelfze, N. (2014). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921

This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations experience similar risks and could benefit from sharing knowledge in order... Read More about HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society.

A comparative review of information security risk assessment methodologies for health care. (2011)
Presentation / Conference
Hazelhoff Roelfzema, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society

Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk assessments and the implementation of controls to secure data. In theory, an... Read More about A comparative review of information security risk assessment methodologies for health care..

Analysis of Information governance and patient data protection within primary health care (2010)
Journal Article
Smith, M., Buchanan, W. J., Thuemmler, C., Bell, D., & Hazelhoff Roelfzema, N. (2010). Analysis of Information governance and patient data protection within primary health care. International Journal for Quality in Health Care,

The introduction of Information Governance throughout the NHS in Great Britain from 2004 onwards, saw Pri-mary Care Medicine subject to a regulatory regime aligning current practice with codes, ethics, legislation and standa... Read More about Analysis of Information governance and patient data protection within primary health care.