18.01.2013 Views

MEDICINSKI GLASNIK

MEDICINSKI GLASNIK

MEDICINSKI GLASNIK

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

264<br />

Medicinski Glasnik, Volumen 6, Number 2, August 2009<br />

private data. The fact that majority of participants<br />

from both groups do it on an exceptional basis or<br />

very rarely implies their awareness of this major<br />

security issue.<br />

Furthermore, the Internet is a well known<br />

source of malicious software. Medical information<br />

systems are becoming more and more vulnerable<br />

to attacks by malicious software (6).<br />

Unaware and unprotected portable PC users who<br />

have access to a medical information system also<br />

pose a security threat. The only participant from<br />

the School of Medicine who has no security software<br />

on his portable PC is “secured” by using the<br />

LINUX operating system, whereas the majority<br />

of the persons tested have at least 2 types of security<br />

software installed on their portable PCs. Even<br />

though the reason for such consciousness might<br />

be just self-protection, it results in a reduced risk<br />

not only for the user and his portable PC, but also<br />

for the environment in which they operate.<br />

The frequency distribution of making security<br />

backups in both groups is very low. Only 4<br />

participants from the School of Medicine and 6<br />

from the School of Electrical Engineering make<br />

security backups of their important documents<br />

once a week or more frequently. The difference<br />

in answers on questions about security experts’<br />

REFERENCES<br />

1.<br />

2.<br />

3.<br />

4.<br />

5.<br />

Dantu R, Oosterwijk H, Kolan P, Husna H. Securing<br />

medical networks. Network Security 2007;<br />

2007: 13-16.<br />

Yen-Chiao L, Yan X, Andrew S, Julie A.J. A review<br />

and a framework of handheld computer<br />

adoption in healthcare. Int J Med Inform 2005;<br />

74: 409-22.<br />

Potter B. Mobile security risks: ever evolving.<br />

Network Security 200; 2007: 19-20.<br />

Hawkins S, Yen D.C, Chou D.C. Awareness and<br />

challenges of Internet security. Information Management<br />

& Computer Security 2000; 8: 131-43.<br />

Kluge E-H.W. Secure e-Health: Managing risks<br />

to patient health data. Int J Med Inform 2007; 76:<br />

402-6.<br />

terminology between groups investigated was the<br />

only difference found between them.<br />

It seems that information about the importance<br />

of backups and instructions on how to do<br />

backup should be presented to each PC user. It<br />

is considered to be even more important for users<br />

having a mobile device because their portable<br />

PCs are not (all the time) part of the secured<br />

corporate ICT system. Those instructions should<br />

come in the same box with portable PCs (7).<br />

The study shows that users’ awareness on security<br />

risks plays an important role in securing the<br />

data (8,9). Participants did present great knowledge<br />

in this matter and their systems are secured.<br />

The number of portable PC users is growing<br />

every day, as well as their impact on the security<br />

of surrounding ICT systems. Although based on a<br />

rather small sample, the results of the pilot study<br />

may serve as a starting point for further research<br />

in security matters in systems consisting of portable<br />

PCs and their users, as well as in their security<br />

behavior in different environments.<br />

ACKNOWLEDGMENT / DISCLOSURE<br />

6.<br />

7.<br />

8.<br />

9.<br />

Competing interests: none declared.<br />

Gobuty D. Defending medical information systems<br />

against malicious software. International<br />

Congress Series 2004; 1268: 96-107.<br />

Phippen A, Furnell S. Taking Responsibility for<br />

online protection - why citizens have their part<br />

to play, Computer Fraud & Security 2007; 2007:<br />

8-13.<br />

TechNet Security Centre, Microsoft. http://www.<br />

microsoft.com/technet/security/ (10th of August<br />

2007)<br />

Sophos Security Information web page. http://<br />

www.sophos.com/security/ (10th of August 2007)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!