<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>6HFXULW\ ,VVXHV LQ +HDOWK &amp;DUH 3URFHVV ,QWHJUDWLRQ ± D 5HVHDUFK LQ 3URJUHVV 5HSRUW</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rose-Mharie Åhlfeldt</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Per Backlund</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Benkt Wangler</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eva Söderström</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Skövde</institution>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The aim of this paper is to summarize our research and describe our current position in the areas of health care process integration and information security. Security is one of the important non functional aspect of interoperability within the INTEROP NoE. The paper will briefly introduce our work and some findings concerning security issues in process integration within the health care sector.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>,QIRUPDWLRQ 6HFXULW\</p>
      <p>
        The research area involves B2B1 integration with a specific interest in information
security in health care processes. Information security is a central concept, elaborated
in
        <xref ref-type="bibr" rid="ref6">SIS (2003)</xref>
        and Phleeger (2003). In this paper, we adhere to the definitions in
        <xref ref-type="bibr" rid="ref6">SIS
(2003)</xref>
        and
        <xref ref-type="bibr" rid="ref7">SITHS (2000)</xref>
        , summarized as follows: Information security is the
collected effect of measures to minimize the risks addressed for the availability,
confidentiality, integrity and accountability of information (Figure 1).
      </p>
      <p>
        $YDLODELOLW\ concerns how to use resources to the expected extent and within the
desired timeframe. 6HFUHF\ means that data must not be accessible or unveiled to
unauthorized people. ,QWHJULW\ concerns protection against undesired changes. $F
FRXQWDELOLW\ refers to the ability to distinctly derive performed operations to an
individual. Technical and administrative security measures are both needed to reach these
four characteristics. 7HFKQLFDO VHFXULW\ consist of physical security, e.g. alarm and fire
protection; and IT-security, e.g. computer and network security. Computer security
concerns specific computers and their applications. Network security concerns
security measures for information distributed in networks. $GPLQLVWUDWLYH VHFXULW\
concerns management of information security; strategies, policies etc. Planning and
implementation in security work requires a structured way of working. We note that in a
computerized environment, it is easy to focus more on technical measures and
functions.
1 Business-to-Business (B2B) is communication and transactions between at least two
business partners via Internet technology
        <xref ref-type="bibr" rid="ref10">(Wangler et al, 2001)</xref>
        .
      </p>
      <p>
        The health care sector is an example application area where numerous
interoperability problems need to be resolved. The VITA Nova project
        <xref ref-type="bibr" rid="ref3 ref9">(Wangler et al., 2003;
Perjons et al., 2005)</xref>
        focuses on the patient process, and includes communication
between healthcare providers and healthcare units. The project goals are to develop a
methodology for and to investigate the potential of an IT architecture based on
process manager technology.
      </p>
      <p>
        In the context of information security in the healthcare sector it can be assumed that
information is sensitive. Computerization of information handling gives access to
information from databases in ways not previously possible. Healthcare sector
information security has two important aims: a high level of patient security, i.e. to give
patients opportunities to the best care with right information in right time; and a high
level of patient privacy; i.e. to protect patients from that sensitive information is
distributed to unauthorized persons. These aims are hard to reach together, since one aim
is often reached at the expense of another. Hence, a balance between them is
necessary
        <xref ref-type="bibr" rid="ref8">(Teldok, 2004)</xref>
        . Process integration herein entails that information transfer
between units must be satisfactory from the perspective of the patient and the his/her
relatives, as well as from the legal and security perspectives
        <xref ref-type="bibr" rid="ref3">(Perjons et al., 2005)</xref>
        .
      </p>
      <p>In the following subsections, three case applications of information security will be
presented in relation to the model in Figure 1.</p>
      <p>,7 6HFXULW\</p>
      <p>
        A case study from the VITA Nova project
        <xref ref-type="bibr" rid="ref12 ref2">(Åhlfeldt and Nohlberg, 2005)</xref>
        shows
that none of the involved systems had a function to log the use of user accounts
automatically, and to alert when a user’s account has not been used during a specific
period of time. Furthermore, there is no verification technique for the identification of
the users other than passwords. Sufficient control of authentication techniques for
access to sensitive information should be managed by a two-party solution (Protect
Data, 2004): something you have and something you know.
      </p>
      <p>
        The lack of a strong signing technique is a security risk. Earlier work
        <xref ref-type="bibr" rid="ref11">(Åhlfeldt and
Ask, 2004)</xref>
        has shown that users may utilize other users’ login and password in order
to avoid a new login procedure, since they believe it takes too long to do it.
      </p>
      <p>$YDLODELOLW\ YV FRQILGHQWLDOLW\</p>
      <p>
        Authentication affects both availability and confidentiality. If we only have to reach
availability it would be unnecessary to put so much effort into authentication and
authorization. With the aim to reach both patient security and patient integrity, we
need confidentiality as well. However, the balance between these two frequently
mismatches
        <xref ref-type="bibr" rid="ref11">(Åhlfeldt and Ask, 2004)</xref>
        .
      </p>
      <p>$GPLQLVWUDWLYH 6HFXULW\</p>
      <p>
        A case study by Åhlfeldt and
        <xref ref-type="bibr" rid="ref2">Nohlberg (2005)</xref>
        shows that non of the organizations
studied has deliberate education in security. One of them shows some awareness, as
they send out reminders on currently active viruses. Another organization has not
undertaken any security education for their users for the past ten years.
      </p>
      <p>
        The human element is another important aspect, since e.g. social engineering
attacks are becoming more and more common
        <xref ref-type="bibr" rid="ref12 ref2">(Nohlberg, 2005)</xref>
        . Social engineering is
defined as a hacker’s manipulation of the human tendency to trust other people in
order to obtain information that will allow unauthorized access to systems
        <xref ref-type="bibr" rid="ref1">(Granger,
2001)</xref>
        .
        <xref ref-type="bibr" rid="ref2">Nohlberg (2005)</xref>
        shows that the human element is vulnerable to an extent that
overshadows most other security measures. Such attacks are effective among
technology-savvy users, and even more so among less skilled users
        <xref ref-type="bibr" rid="ref12 ref2">(Nohlberg, 2005)</xref>
        .
      </p>
      <p>&amp;RQFOXVLRQ</p>
      <p>The information security model in Figure 1 is a major contribution from our
research. It stresses the need to go beyond technical security, and highlights demands for
maintaining availability, confidentiality, integrity, and accountability in an information
security context. The model can be used as a means for analyzing security in a broader
perspective. The following summarizes our major findings from our empirical
material, based on the model:
x Technical security tends to be in focus, but major problems reside in
administrative security as well, i.e. in the management of security issues.
Security education is important in this context.
x There is a need for education in security matters, e.g. of higher awareness
of why security issues are important.</p>
      <p>Problems in providing adequate technical security results in insufficient
availability.
x Legitimacy control must be improved. Passwords are not sufficient for
dealing with delicate information due to the risk of social engineering.</p>
      <p>In future work, we intend to elaborate the information security model in order to
make it useful as a tool for analysing security. We will also study and characterise
standards within the healthcare sector, e.g. as a starting point for developing a core
domain ontology for the healthcare sector. This ontology may be used for managing
semantic interoperability issues in relation to security. Standards are essential for
achieving interoperability between healthcare providers and healthcare units, in being
a common language underpinning the communication. They enable applications to
exchange messages and documents, and to automatically respond to actions by other
applications.</p>
      <p>5HIHUHQFHV</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Granger</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2001</year>
          ) Social Engineering Fundamentals [Online]
          <string-name>
            <given-names>Security</given-names>
            <surname>Focus</surname>
          </string-name>
          . Available from : http://www.securityfocus.com/printable/infocus/1527 [Accessed 2003-
          <volume>09</volume>
          -18]
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Nohlberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>Social Engineering Audits Using Anonymous Surveys - Conning the Users in Order to Know if They Can Be Conned</article-title>
          .
          <source>In CD-ROM Proceedings of the 4th Security Conference</source>
          <year>2005</year>
          ,
          <string-name>
            <given-names>Las</given-names>
            <surname>Vegas</surname>
          </string-name>
          ,
          <fpage>30</fpage>
          -
          <issue>31</issue>
          <year>March</year>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Perjons</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wangler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wäyrynen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Åhlfeldt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2005</year>
          ) ,
          <string-name>
            <given-names>QWURGXFLQJ D</given-names>
            <surname>SURFHVV PDQDJHU LQ KHDOWKFDUH DQ H[SHULHQFH</surname>
          </string-name>
          <string-name>
            <surname>UHSRUW</surname>
          </string-name>
          ,
          <source>Health Informatics Journal</source>
          ,
          <volume>11</volume>
          (
          <issue>1</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Pfleeger</surname>
            ,
            <given-names>C</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>6HFXULW\ LQ &amp;RPSXWLQJ, Prentice Hall</article-title>
          .
          <source>ISBN 0-13-035548-8.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>ProtectData</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <source>News from Pointsec Mobile Technologies June</source>
          <year>2004</year>
          . [on line] http://www.pointsec.com/news/download/PMT2_04_72dpi_klar.
          <source>pdf [accessed November</source>
          <year>2004</year>
          ]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>SIS</surname>
          </string-name>
          (
          <year>2003</year>
          ).
          <source>SIS Handbok 550. Terminologi för Informationssäkerhet. Stockholm</source>
          <year>2003</year>
          (in Swedish).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>SITHS-projekt</surname>
            <given-names>,</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Infrastruktur för informationssäkerhet i hälso- och sjukvården</article-title>
          . Stockholm: Säker IT i Hälso- och
          <string-name>
            <surname>Sjukvården</surname>
          </string-name>
          ,
          <article-title>ISBN 92-</article-title>
          (in Swedish).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Teldok</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Patientdata - brist och överflöd i vården</article-title>
          .
          <source>Teldok rapport nr 154. ISSN 0281 - 8574</source>
          (in Swedish).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Wangler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Åhlfeldt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Perjons</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2003</year>
          )
          <article-title>3URFHVV 2ULHQWHG ,QIRUPDWLRQ 6\VWHPV $UFKL WHFWXUHV LQ +HDOWKFDUH, Health Informatics Journal</article-title>
          ,
          <year>December 2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Wangler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Persson</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Söderström</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2001</year>
          ),
          <article-title>Enterprise Modeling for B2B Integration</article-title>
          ,
          <source>In Proceedings of the In International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, August</source>
          <volume>6</volume>
          -12, L'Aquila, Italy
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Åhlfeldt</surname>
            ,
            <given-names>R-M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ask</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Information Security in Electronic Medical Records: A case study with the user in focus</article-title>
          .
          <source>In Proceedings of the 2004 Information Resources Management Association International Conference. New Orleans</source>
          , USA, May, pp.
          <fpage>345</fpage>
          -
          <lpage>347</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Åhlfeldt</surname>
            ,
            <given-names>R-M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Nohlberg</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>System and Network Security in a Heterogeneous Healthcare Domain: A Case Study</article-title>
          .
          <source>In CD-ROM Proceedings of the 4th Security Conference</source>
          , Las Vegas, USA,
          <fpage>30</fpage>
          -
          <lpage>31</lpage>
          March
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>