Abstract
Information Systems have been used for many years to analyze problems and compare options in a managed environment. The introduction of computer and information security systems into such an environment is a typical example of a situation to which an Information Systems approach can be applied. In this paper, we examine the issues peculiar to implementation of security in a healthcare environment, looking specifically at one such specially designed system, SIM-ETHICS, which takes a participational approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Warren, M.J. and Hutchinson.: W. A Security Method for Healthcare Organisations, 8th IFIP Annual Working Conference on Information Security Management, pp 157–167, Las Vegas, USA, September (2001).
Avison, D.E. & Fitzgerald, G.: Information Systems Development: Methodologies, Techniques and Tools. McGraw-Hill, UK (1995).
Flynn, D.: Information Systems Requirements: Determination and Analysis. McGraw-Hill, UK (1998).
Flynn D. and Jazi M. D.: Constructing user requirements: a social process for a social context. Information Systems Journal, Vo: 8, No1 53–83. Blackwell Science, UK (1998).
Leitch S., Hutchinson W. and Warren M.J: Healthcare IT Security: Can the European Union experiences assist Australia, ACIS (Australasian Conference on Information Systems) 00, pp 101–107, Brisbane, Australia, December (2000).
Mumford, E.: Computers, Planning and Personnel Management, Institute of Personnel Management, UK (1969).
Mumford, E.: Values, Technology and Work. Martinus Nijhoff Publishers, The Netherlands, (1981).
Mumford, E.: Designing Participatively, Technical Report, Manchester Business School, UK (1983).
Mumford, E.: Designing Human Systems, Technical Report, Manchester Business School, Manchester, UK (1983).
Warren, M.J. and Warren S.: The Role of Participation in Systems, International Conference on Systems Thinking in Management, (Incorporating the First Australasian Conference on System Dynamics and Sixth Australia and New Zealand Systems Conference), pp638–642, Geelong, Australia, November, (2000).
Mumford, E.: Designing Human Systems For Health Care, The ETHICS Method, 4C Corporation, Netherlands, (1993).
Mumford, E.: Effective Requirement Analysis and Systems Design: The Ethics Method, Macmillan, UK (1995).
Furnell, S.M. Warren M.J and Evans M.P.: The ISHTAR World Wide Web Dissemination and Advisory Service for Healthcare Information Security, Published in “Implementing Secure Healthcare Telematics Applications in Europe”, pp 249–289, IOS Press, The Netherlands, ISBN 90-5199-489-3, (2001).
Mumford, E. and Henshall, D.: A participative approach to computer systems design, Associated Business Press, UK (1979).
Mumford, E. and MacDonald, W.: XSEL’S Progress: The Continuing Journey of an Expert System, John Wiley & Sons Ltd, UK (1989).
Mumford, E and Ward, T.B.: Computers: Planning for People, Batsford Limited, UK (1968).
Furnell S.M, Gritzalis D., Katsikas S., Mavroudakis K., Sanders P. and Warren M.J.: Methods of responding to healthcare security incidents, CD Proceedings, Medinfo 98, Seoul, South Korea, August (1998).
Nurminen, N.: People of Computers: Three ways of Looking at Information Systems, Chartwell-Bratt, Sweden (1988).
Schneier, B.: Secrets and Lies, Wiley Computer Publishing (2000).
Warren, M.J.: A Practical Soft System Management Approach to Implementing Security, Deakin University Technical Report CC99/05, Deakin University, Australia. (1999).
Warren, M.J.: A Risk Analysis Model to reduce computer security risks among healthcare organisations, Risk Management: An International Journal, Perpetuity Press, Vol 3: No 1, pp 27–37, UK. (2000).
Warren, M.J. Sanders, P.W & Gaunt, P.N.: Participational Management and the Implementation of Multimedia Systems, In Proceedings MEDIACOMM 95-International Conference on Multimedia Communications, Southampton, pp 131–155, UK (1995).
Warren, M.J., Warren, S. and Love, P.E.D: Using Participation Effectively to Implement and Evaluate Information Security within an Organisation, In Proceedings of Americas Conference on Information Systems 2000 (AMCIS 2000). pp 310–316, Long Beach, California, USA, (2000).
Zuboff, S.: In the Age of the Smart Machine, Basic Books, New York, USA (1988).
New South Wales Government (NSW). Report of the NSW Health Council — A Better Health System for NSW, ISBN 0-7347-3138-8, Australia. (2000).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Warren, M.J., Batten, L.M. (2002). Security Management: An Information Systems Setting. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_21
Download citation
DOI: https://doi.org/10.1007/3-540-45450-0_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43861-8
Online ISBN: 978-3-540-45450-2
eBook Packages: Springer Book Archive