Threats and Risk on Using Digital Technologies for Remote Health Care Process
Abstract
References
Index Terms
- Threats and Risk on Using Digital Technologies for Remote Health Care Process
Recommendations
Towards a Realistic Risk Assessment Methodology for Insider Threats of Information Misuse
FIT '14: Proceedings of the 2014 12th International Conference on Frontiers of Information TechnologyThe problem of insider threats is not new to organizations and research community. Organization cannot afford any kinds of attacks on their confidential information and resources either from insiders or out-siders. The damage done by insiders is more ...
An Enhanced Threat Identification Approach for Collusion Threats
METRISEC '11: Proceedings of the 2011 Third International Workshop on Security Measurements and MetricsColluding threat agents are a serious and difficult problem to deal with in any organization. Collusion is possible at any level and with any entity inside or outside the organization. Traditional methods cannot effectively deal with legitimate users ...
Assessing vulnerability exploitability risk using software properties
Attacks on computer systems are now attracting increased attention. While the current trends in software vulnerability discovery indicate that the number of newly discovered vulnerabilities continues to be significant, the time between the public ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/fe15eaa8-29db-48a8-9efd-0c0d000bdf83/3626641.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 266Total Downloads
- Downloads (Last 12 months)266
- Downloads (Last 6 weeks)43
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in