Next Article in Journal
Effectiveness of Small Amount of Surface Penetrant against Chloride Ion Penetration
Previous Article in Journal
Neonatal Activity Monitoring by Camera-Based Multi-LSTM Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

ISO 27001 Information Security Survey of Medical Service Organizations †

1
Department of Multimedia and Game Development, Chia Nan University of Pharmacy & Science, Tainan 717301, Taiwan
2
XieTong B&B, Hualien 970342, Taiwan
*
Author to whom correspondence should be addressed.
Presented at the IEEE 5th Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability, Tainan, Taiwan, 2–4 June 2023.
Eng. Proc. 2023, 55(1), 19; https://doi.org/10.3390/engproc2023055019
Published: 29 November 2023

Abstract

:
The differences between medical institutions in the security management of information systems were investigated by comparing the differences and the means used by personnel in different units in public and private hospitals. Personnel responsible for information security require the protocol of relevant units to solve information security issues. Based on ISO 27001 as a reference standard, a questionnaire survey was conducted to investigate the need for information security management in medical institutions. The information system security in each unit of medical institutions needs to pursue the goal of more perfection for a fully optimized information system. To help medical institution personnel understand the importance of information security and allow appropriate decision making, the results of this study can be used as a reference.

1. Introduction

In medicine and health care, the rapid development of the information industry has shed the security problems in their information systems such as the leakage of medical information. Several medical staff have even been caught selling patients’ private information illegally. Thus, equipment and system software in the medical and health sector for information security are frequently updated. However, the new system has too many functions to be used adequately, leading to many potential security risks. The risk of hacking and cyber attacks also exists, threatening the information security of medical institutions. Related incidents increase every year, which makes people aware of the damage caused by such incidents.
The information network allows users to access relevant information and data quickly under relevant instructions. Due to the openness of the information network and system, they become useful but dangerous. Use of the information system by an unauthorized person damages the management and financials. Therefore, the development of a system for information security that does not sacrifice convenience and usability is required for securing confidentiality, integrity, and availability. The system also protects information assets and increases overall competitiveness. Information systems can be accessed by users and administrators, but information can be retrieved by inappropriate means. Hackers can damage the system and steal information using point-of-entry attacks, backdoors, Trojan horses, and viruses. Therefore, building a defensive information system security is necessary to provide complete and uninterrupted operation, including resistance, detection, and recovery [1].
Information security in medical institutions differs from that in other industry sectors. As medical care is related to patient safety, information security must be considered more seriously. If the system provides false information, this harms patients as well as the hospital’s credit and reputation. In addition, patients’ medical records and personal information may be leaked due to inadequate information security protection. If the patient’s private information is used by a third party illegally, the patient’s rights will be seriously compromised. Therefore, special attention must be paid to the security of patient information. The design of systems must meet the requirements of information security. Therefore, it is necessary to build an information security system that is accurate and effective in security.
The degree of informatization of an organization is closely related to the information strategy, information department structure, information system architecture, and information application areas. Information security strategy is influenced by the differentiation of the internal environment of the organization, so the characteristics of the organization and the degree of informatization lead to different combinations of information risk due to the types of organizations [2]. The different information risks require different information security strategies. The growth of organizational information can be measured in four aspects: information system architecture, information department strategy, information department organization, and information application area [3]. Although there is no research on the relationship between information security and the degree of informatization, it was found that information security is affected by information threats to personal computers and internal servers (mainframe) and improper operation of networked architectural systems [4,5].
To maintain information security, it is necessary to understand “the prevention and detection of unauthorized situations by users of the processing system” [6]. Information security is defined broadly as the protection of confidentiality, integrity, and availability of data stored in a system. There are many norms set for information security, such as BS7799 [7] and ISO 27001 [8]. To regulate the security and confidentiality of information and to meet the privacy needs of individuals, the US federal government passed the Health Insurance Portability and Accountability Act (HIPAA) in 1996, which specified the security mechanisms that must be in place for information systems. Its contents include the following four categories: administrative procedures, physical safeguards, technical security services, and technical security mechanisms. Based on BS7799, ISO 27001, and HIPAA, we investigated the need for an effective management system for information security through a questionnaire survey to provide the basis for the construction of the system. To assess the information security of an organization, indicators of risk assessment and information protection capability need to be determined. For understanding of the risks in information security and the degree of informatization, an accurate assessment of the existing information protection capability is required. Therefore, information risks were assessed from four aspects: hardware, software, information, and network, in terms of the physical environment, personnel, and management in this study. A questionnaire survey was conducted to define measurement indexes for these seven risks.

2. Questionnaire Survey

Based on the theory of Icove et al. [9], information risk was analyzed to understand the level of protection of information using the protection measures of each risk. Siegel referred to ISO 17799 [10] and InfoSec international standards, while Richardson [11] referred to the Computer Security Institute (CSI) against network risk threats for analysis. Referring to CNS 27001 [12] of the Ministry of Economic Affairs, BS7799 of the UK, and the international information security standard ISO 27001, we created a questionnaire to understand preventative measures for information security. The questionnaire was revised by experts to improve its validity. The final questionnaire was designed to measure the level of knowledge of information security and the importance of information security in the organization.
The questionnaire consisted of three parts including basic information, the current situation of information security, and risk awareness of information security. In this study, the risk to information security was classified into physical and system aspects. In the physical aspect, the risks were grouped as the physical, human, and managerial risks, while in the system aspect, the risks in hardware, software, data, and network were included. The questionnaire included questions on equipment, management, virus, training, troubleshooting, and accounts of the information security systems. Figure 1 illustrates the structure of the questionnaire. The questions for the seven were contained in the six categories.
A five-point Likert scale was used in the questionnaire. Scores were given to strongly agree, agree, average, disagree, and strongly disagree with the organization’s ability for information security, with one point representing no protection and five points representing sufficient protection. The reliability of the questionnaire was analyzed using Cronbach’s alpha coefficient [13,14]. The internal consistency was also tested with Cronbach’s alpha coefficient. The overall reliability was 0.949. The reliability of questions of software risk, hardware risk, data risk, network risk, physical risk, human risk, and managerial risk was 0.796, 0.639, 0.709, 0.790, 0.724, 0.751, and 0.813, all of which showed acceptable reliability and credibility.
A total of 150 questionnaires were distributed to the personnel in charge of information security in public and private hospitals in the southern region and military and security units in Taiwan, with 123 returned. The total number of valid questionnaires was 113. The respondents included administrative and information security staff, network administrators, and supervisors. The education of the respondents was at least college- and university-level (Table 1).
Some 72.6% of the respondents were male, and 27.4% were female. A majority of the respondents were executives (56.1%), followed by information security personnel (29.0%), network administrators (9.3%), and supervisors (5.6%). Respondents with eight years of work experience accounted for 31.0%, followed by those with less than one year (29.2%), those with two to four years (25.7%), and those with five to seven years (14.2%) (Table 2).
As shown in Table 3, the respondents mainly served in military health units (46.9%), followed by private hospitals (37.2%), and then public hospitals (15.9%). Detailed information on the units was recorded in the interview.

3. Results

The results of the survey are shown in Table 4. The highest protection ability of information security was observed for software risk, with a sum of scores of 436.835, while the lowest was for data risk, with a sum of scores of 400.882. For hardware risk, the ability showed the highest average score of 3.357, while the lowest score was observed for managerial risk, with an average score of 3.000. The highest average score was obtained for software risk, with a score of 4.196, while the lowest score was for data risk, with an average score of 3.912 (Table 4 and Table 5).
Table 4 shows the standard deviation of the scores in this study. The smaller the standard deviation, the more concentrated the data are in this dimension, while the larger the standard deviation, the more scattered the data are in this dimension. It was found that the dimension of network risk was widely dispersed, while the data for the aspect of risk management were more concentrated. This result indicated that the respondents held diverse perspectives on cyber risks, which might be influenced by personal experiences, knowledge, or preferences. However, their views on risk management are more uniform, and may be influenced by shared norms or standards.

4. Conclusions

Personnel in public hospitals understood the importance of all risks to information security better than those in other healthcare institutions. However, public hospitals do not invest more in information security than private hospitals, nor do they have a higher degree of information restriction than military health care units. Thus, public hospitals need to place more emphasis on the quality of personnel and management systems with various information security policies, rapid troubleshooting, reliable backup of important data, regular updates to key system security, training of personnel on information security, and control of information flow. The maintenance of information security must be conducted by constantly updating software and hardware equipment and maintaining the information security system. All information in the system must be restricted to authorized personnel and operators. The most effective way to maintain information security is to cultivate personnel and establish an effective managerial system.

Author Contributions

Conceptualization, H.-H.H. and J.-R.S.; methodology, H.-H.H. and J.-R.S.; software, J.-R.S.; validation, H.-H.H. and J.-R.S.; formal analysis, J.-R.S.; investigation, H.-H.H. and J.-R.S.; resources, H.-H.H. and J.-R.S.; data curation, J.-R.S.; writing—original draft preparation, H.-H.H. and J.-R.S.; writing—review and editing, H.-H.H.; visualization, H.-H.H. and J.-R.S.; supervision, H.-H.H.; project administration, H.-H.H.; funding acquisition, H.-H.H. All authors have read and agreed to the published version of the manuscript.

Funding

The researchers thank the Ministry of Economic Affairs for the research grant (112th Annual Funding Support for the Academic Promotion of Value-added Technology and Innovation Program in Local Industry).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest. XieTong B&B has no conflict of interest with the paper.

References

  1. Ellison, R.J.; Linger, R.C.; Longstaff, T.; Mead, N.R. Survivable network system analysis: A case study. IEEE Softw. 1999, 16, 70–77. [Google Scholar] [CrossRef]
  2. Kumar, V.; Telang, R.; Mukhopadhyay, T. Enterprise Information Security: Who Should Manage it and How? In Proceedings of the 5th Annual Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, 26–28 June 2006. [Google Scholar]
  3. Earl, M.J. Management Strategies for Information Technology; Prentice-Hall, Inc.: Hoboken, NJ, USA, 1989. [Google Scholar]
  4. Loch, K.D.; Carr, H.H.; Warkentin, M.E. Threats to information systems: Today’s reality, yesterday’s understanding. MIS Q. 1992, 16, 173–186. [Google Scholar] [CrossRef]
  5. Ryan, S.D.; Bordoloi, B. Evaluating security threats in mainframe and client/server environments. Inf. Manag. 1997, 32, 137–146. [Google Scholar] [CrossRef]
  6. Hartel, P.H.; Junger, M.; Wieringa, R.J. Cyber-Crime Science= Crime Science + Information Security; Technical Report TR-CTIT-10-34; CTIT, University of Twente: Enschede, The Netherlands, 2010. [Google Scholar]
  7. BS 7799-2; Information Security Management—Part 2: Specification for Information Security. British Standards Institution: London, UK, 1999.
  8. ISO 27001; Information Security Management Standard. ISO: Geneva, Switzerland, 2005.
  9. Icove, D.; Seger, K.; VonStorch, W.R. Computer Crime: A Crimefighter’s Handbook; O’Reilly & Associates, Inc.: Sebastopol, CA, USA, 1995. [Google Scholar]
  10. ISO/IEC 17799; Information Technology-Code of Practice for Information Security Management. ISO: Geneva, Switzerland, 2005.
  11. Gordon, L.A.; Loeb, M.P.; Lucyshyn, W.; Richardson, R. 2005 CSI/FBI computer crime and security survey. Comput. Secur. J. 2005, 21, 1. [Google Scholar]
  12. CNS 27001; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. CNS: Taipei, Taiwan, 2023.
  13. Kankanhalli, A.; Teo, H.H.; Tan, B.C.; Wei, K.K. An integrative study of information systems security effectiveness. Int. J. Inf. Manag. 2003, 23, 139–154. [Google Scholar] [CrossRef]
  14. Shah, N.R.; Aragones, A.; Schaefer, E.W.; Stevens, D.; Gourevitch, M.N.; Glasgow, R.E. Validation of the Spanish Translation of the Patient Assessment of Chronic Illness Care (PACIC) Survey. Prev. Chronic Dis. 2008, 5, A113. [Google Scholar]
Figure 1. Structure of questionnaire in this study.
Figure 1. Structure of questionnaire in this study.
Engproc 55 00019 g001
Table 1. Information on respondents of questionnaire survey.
Table 1. Information on respondents of questionnaire survey.
PositionNumberRatio (%)
Administration staff6053.1%
Information security personnel3127.4%
Network administrator108.8%
Director65.3%
Missing value65.3%
Sum113100.0%
Table 2. Working seniority scale table.
Table 2. Working seniority scale table.
Work ExperienceNumberRatio (%)
Over 8 years3531.0%
1 year or less3329.2%
2~4 years2925.7%
5~7 years1614.2%
Missing value00.0%
Sum113100.0%
Table 3. Unit type ratio table.
Table 3. Unit type ratio table.
InstitutionsNumberRatio (%)
Military medical service5346.9%
Private hospital4237.2%
Public hospital1815.9%
Missing value00.0%
Sum113100.0%
Table 4. Protection ability of information security for each risk.
Table 4. Protection ability of information security for each risk.
Sum of ScoresAverage of Minimum ScoreAverage of Maximum ScoreStandard Deviation
Software Risk436.8353.3043.3040.574
Hardware Risk415.6153.3573.3570.603
Data Risk400.8823.083.080.504
Cyber Risk415.3553.2233.2230.625
Physical Risk413.6573.0833.0830.5
Human Risk407.5463.0883.0880.525
Managerial risk407.1733.0003.0000.425
Table 5. Summary of result of questionnaire survey.
Table 5. Summary of result of questionnaire survey.
DirectorAdministration StaffInformation Security PersonnelNetwork AdministratorTotal
InstitutionsResponseNumberRatio (%)NumberRatio (%)NumberRatio (%)NumberRatio (%)NumberRatio (%)
Private HospitalVery well understood150.0%111.1%00.0%00.0%211.1%
Fairly well understood150.0%444.4%375.0%3100.0%1161.1%
Somewhat00.0%444.4%125.0%00.0%527.8%
Private HospitalVery well understood00.0%29.5%215.4%233.3%614.3%
Fairly well understood150.0%838.1%430.8%116.7%1433.3%
Somewhat150.0%628.6%753.8%350.0%1740.5%
Do not know00.0%523.8%00.0%00.0%511.9%
Public HospitalVery well understood00.0%723.3%17.1%00.0%817.0%
Fairly well understood150.0%930.0%750.0%00.0%1736.2%
Somewhat150.0%516.7%642.9%1100.0%1327.7%
Do not know00.0%930.0%00.0%00.0%919.1%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hsu, H.-H.; Shih, J.-R. ISO 27001 Information Security Survey of Medical Service Organizations. Eng. Proc. 2023, 55, 19. https://doi.org/10.3390/engproc2023055019

AMA Style

Hsu H-H, Shih J-R. ISO 27001 Information Security Survey of Medical Service Organizations. Engineering Proceedings. 2023; 55(1):19. https://doi.org/10.3390/engproc2023055019

Chicago/Turabian Style

Hsu, Hung-Hsiou, and Jyun-Rong Shih. 2023. "ISO 27001 Information Security Survey of Medical Service Organizations" Engineering Proceedings 55, no. 1: 19. https://doi.org/10.3390/engproc2023055019

Article Metrics

Back to TopTop