Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective

    Hosam Alhakami1,*, Abdullah Baz2, Mohammad Al-shareef3, Rajeev Kumar4, Alka Agrawal5, Raees Ahmad Khan5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2773-2786, 2023, DOI:10.32604/iasc.2023.021560

    Abstract Recent transformation of Saudi Arabian healthcare sector into a revenue producing one has signaled several advancements in healthcare in the country. Transforming healthcare management into Smart hospital systems is one of them. Secure hospital management systems which are breach-proof only can be termed as effective smart hospital systems. Given the perspective of Saudi Vision-2030, many practitioners are trying to achieve a cost-effective hospital management system by using smart ideas. In this row, the proposed framework posits the main objectives for creating smart hospital management systems that can only be acknowledged by managing the security of healthcare data and medical practices.… More >

  • Open Access

    ARTICLE

    A Usability Management Framework for Securing Healthcare Information System

    Hosam Alhakami1, Abdullah Baz2, Wajdi Alhakami3, Abhishek Kumar Pandey4, Alka Agrawal4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1015-1030, 2022, DOI:10.32604/csse.2022.021564

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber… More >

Displaying 1-10 on page 1 of 2. Per Page