MEDICINSKI GLASNIK
MEDICINSKI GLASNIK
MEDICINSKI GLASNIK
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
264<br />
Medicinski Glasnik, Volumen 6, Number 2, August 2009<br />
private data. The fact that majority of participants<br />
from both groups do it on an exceptional basis or<br />
very rarely implies their awareness of this major<br />
security issue.<br />
Furthermore, the Internet is a well known<br />
source of malicious software. Medical information<br />
systems are becoming more and more vulnerable<br />
to attacks by malicious software (6).<br />
Unaware and unprotected portable PC users who<br />
have access to a medical information system also<br />
pose a security threat. The only participant from<br />
the School of Medicine who has no security software<br />
on his portable PC is “secured” by using the<br />
LINUX operating system, whereas the majority<br />
of the persons tested have at least 2 types of security<br />
software installed on their portable PCs. Even<br />
though the reason for such consciousness might<br />
be just self-protection, it results in a reduced risk<br />
not only for the user and his portable PC, but also<br />
for the environment in which they operate.<br />
The frequency distribution of making security<br />
backups in both groups is very low. Only 4<br />
participants from the School of Medicine and 6<br />
from the School of Electrical Engineering make<br />
security backups of their important documents<br />
once a week or more frequently. The difference<br />
in answers on questions about security experts’<br />
REFERENCES<br />
1.<br />
2.<br />
3.<br />
4.<br />
5.<br />
Dantu R, Oosterwijk H, Kolan P, Husna H. Securing<br />
medical networks. Network Security 2007;<br />
2007: 13-16.<br />
Yen-Chiao L, Yan X, Andrew S, Julie A.J. A review<br />
and a framework of handheld computer<br />
adoption in healthcare. Int J Med Inform 2005;<br />
74: 409-22.<br />
Potter B. Mobile security risks: ever evolving.<br />
Network Security 200; 2007: 19-20.<br />
Hawkins S, Yen D.C, Chou D.C. Awareness and<br />
challenges of Internet security. Information Management<br />
& Computer Security 2000; 8: 131-43.<br />
Kluge E-H.W. Secure e-Health: Managing risks<br />
to patient health data. Int J Med Inform 2007; 76:<br />
402-6.<br />
terminology between groups investigated was the<br />
only difference found between them.<br />
It seems that information about the importance<br />
of backups and instructions on how to do<br />
backup should be presented to each PC user. It<br />
is considered to be even more important for users<br />
having a mobile device because their portable<br />
PCs are not (all the time) part of the secured<br />
corporate ICT system. Those instructions should<br />
come in the same box with portable PCs (7).<br />
The study shows that users’ awareness on security<br />
risks plays an important role in securing the<br />
data (8,9). Participants did present great knowledge<br />
in this matter and their systems are secured.<br />
The number of portable PC users is growing<br />
every day, as well as their impact on the security<br />
of surrounding ICT systems. Although based on a<br />
rather small sample, the results of the pilot study<br />
may serve as a starting point for further research<br />
in security matters in systems consisting of portable<br />
PCs and their users, as well as in their security<br />
behavior in different environments.<br />
ACKNOWLEDGMENT / DISCLOSURE<br />
6.<br />
7.<br />
8.<br />
9.<br />
Competing interests: none declared.<br />
Gobuty D. Defending medical information systems<br />
against malicious software. International<br />
Congress Series 2004; 1268: 96-107.<br />
Phippen A, Furnell S. Taking Responsibility for<br />
online protection - why citizens have their part<br />
to play, Computer Fraud & Security 2007; 2007:<br />
8-13.<br />
TechNet Security Centre, Microsoft. http://www.<br />
microsoft.com/technet/security/ (10th of August<br />
2007)<br />
Sophos Security Information web page. http://<br />
www.sophos.com/security/ (10th of August 2007)