{"title":"信息系统管理中的安全。","authors":"T L Huston, J L Huston","doi":"10.1097/00126450-199806000-00005","DOIUrl":null,"url":null,"abstract":"<p><p>Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the \"people part\" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.</p>","PeriodicalId":79738,"journal":{"name":"The Health care supervisor","volume":"16 4","pages":"28-34"},"PeriodicalIF":0.0000,"publicationDate":"1998-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1097/00126450-199806000-00005","citationCount":"4","resultStr":"{\"title\":\"Security in the management of information systems.\",\"authors\":\"T L Huston, J L Huston\",\"doi\":\"10.1097/00126450-199806000-00005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the \\\"people part\\\" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.</p>\",\"PeriodicalId\":79738,\"journal\":{\"name\":\"The Health care supervisor\",\"volume\":\"16 4\",\"pages\":\"28-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1097/00126450-199806000-00005\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Health care supervisor\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1097/00126450-199806000-00005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Health care supervisor","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1097/00126450-199806000-00005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security in the management of information systems.
Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.