A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports
english
2013
Proceedings of the 15th International Conference on Enterprise Information Systems
english
Patients' privacy is critical in healthcare but users of Electronic Health Records (EHR) frequently circumvent existing security rules to perform their daily work. Users are so-called the weakest link in security but they are, many times, part of the solution when they are involved in systems' design. In the healthcare domain, the focus is to treat patients (many times with scarce technological, time and human resources) and not to secure their information. Therefore, security must not
doi:10.5220/0004419200460053
dblp:conf/iceis/FerreiraFSCRPO13
fatcat:uekirzzohzdbtovhi6hhd6lgpy