Abstract
The use of participationid approaches to system design has been debated for a number of years. Within this paper we describe a method that was used to effectively design information systems and implement computer security countermeasures within an healthcare environment and shown how it was used in a number of environments.
Chapter PDF
Similar content being viewed by others
References
Mumford, E (1983a) Designing Participatively, Manchester Business School, UK, ISBN 0-903808-29-3.
Mumford, E (1983b) Designing Human Systems, Manchester Business School, Manchester, UK.
Mumford, E (1986) Using computers for Business, Manchester Business School, Manchester, UK.
NSW Government. (2000). Report of the NSW Health Council-A Better Health System for NSW, ISBN 0-7347-3 138-8, Australia.
Warren, M.J. (1997) A new hybrid approach for Risk Analysis, In Proceedings of IFIP WG11.1-Information Security Management Conference, Copenhagen, Denmark, May.
Warren, M.J. (1999) A Practical Soft System Management Approach to Implementing Security, Deakin University Technical Report CC99/05, Deakin University, Australia.
Warren, M.J (2001) A Risk Analysis Model to reduce computer security risks among healthcare organisations, Risk Management: An International Journal, Vol 3: No 1, pp 27–37, Perpetuity Press, UK.
Warren, M.J, Gaunt, P.N (1994) SP11-06: The use of SIM-ETHICS at a UK Health Authority, European Union SEISMED Research Report SP11-06.
Warren S, Warren M.J (2000). The Role of Participation in Systems, In Proceedings of International Conference on Systems Thinking in Management, (Incorporating the First Australasian Conference on System Dynamics and Sixth Australia and New Zealand Systems Conference), Geelong, Australia, November.
Warren, M.J, Warren, S, Love, P.E.D (2000a) Using Participation Effectively to Implement and Evaluate Information Security within an Organisation, In Proceedings of Americas Conference on Information Systems 2000 (AMCIS 2000). Long Beach, California, USA, August.
Warren S, Hutchinson, W, Warren M.J (2000b), Healthcare IT Security: Can the European Union experiences assist Australia, In Proceedings of ACIS (Australasian Conference on Information Systems) 00, Brisbane, Australia, December.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Warren, M., Hutchinson, W. (2001). A Security Method for Healthcare Organisations. In: Eloff, J.H.P., Labuschagne, L., von Solms, R., Dhillon, G. (eds) Advances in Information Security Management & Small Systems Security. IFIP International Federation for Information Processing, vol 72. Springer, Boston, MA. https://doi.org/10.1007/0-306-47007-1_12
Download citation
DOI: https://doi.org/10.1007/0-306-47007-1_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7506-7
Online ISBN: 978-0-306-47007-3
eBook Packages: Springer Book Archive