{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:08Z","timestamp":1750219808055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T00:00:00Z","timestamp":1481932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,17]]},"DOI":"10.1145\/3033288.3033296","type":"proceedings-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T12:30:32Z","timestamp":1491568232000},"page":"11-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Assessment of Information System in Hospital Environment"],"prefix":"10.1145","author":[{"given":"Suratose","family":"Tritilanunt","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Mahidol University, Salaya, Phuttamonthol, Nakornpathom, Thailand"}]},{"given":"Surapol","family":"Ruaysungnoen","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Mahidol University, Salaya, Phuttamonthol, Nakornpathom, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2016,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"HIMSS Electronic Health Record Definitional Model Version 1.0 HIMSS EHR Committee June 9 2011  HIMSS Electronic Health Record Definitional Model Version 1.0 HIMSS EHR Committee June 9 2011"},{"key":"e_1_3_2_1_2_1","unstructured":"The Health Information Technology for Economic and Clinical Health Act (HITECH) Act January 6 2009  The Health Information Technology for Economic and Clinical Health Act (HITECH) Act January 6 2009"},{"volume-title":"ISO","year":"2008","author":"ISO","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"HA-SPA(Standards Practice Assessment) Healthcare Accreditation Institute (Public Organisation) October 2009  HA-SPA(Standards Practice Assessment) Healthcare Accreditation Institute (Public Organisation) October 2009"},{"key":"e_1_3_2_1_5_1","unstructured":"Hospital IT Quality Improvement Framework (HITQIF) Thai Medical Informatics Association March 15 2012  Hospital IT Quality Improvement Framework (HITQIF) Thai Medical Informatics Association March 15 2012"},{"key":"e_1_3_2_1_6_1","unstructured":"ISMS-201 IT Risk Management Standard Version 2.0 ISO 2012  ISMS-201 IT Risk Management Standard Version 2.0 ISO 2012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"G. Stoneburner A. Goguen and A. Feringa Risk Management Guide for Information Technology System National Institute of Standards and Technology july 2002  G. Stoneburner A. Goguen and A. Feringa Risk Management Guide for Information Technology System National Institute of Standards and Technology july 2002","DOI":"10.6028\/NIST.SP.800-30"},{"key":"e_1_3_2_1_8_1","unstructured":"OWASP Testing Guide The Open Web Application Security Project (OWASP) 2008  OWASP Testing Guide The Open Web Application Security Project (OWASP) 2008"},{"key":"e_1_3_2_1_9_1","unstructured":"HIPAA Security Procedures Resource Manual North Dakota State University (NDSU) September 2012  HIPAA Security Procedures Resource Manual North Dakota State University (NDSU) September 2012"},{"key":"e_1_3_2_1_10_1","unstructured":"Common Vulnerability Scoring System http:\/\/www.first.org\/cvss accessed on August 6 2014  Common Vulnerability Scoring System http:\/\/www.first.org\/cvss accessed on August 6 2014"},{"volume-title":"National Institute of Standards and Technology","year":"2006","author":"Mell P.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-000906"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.005"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"}],"event":{"name":"ICNCC '16: Fifth International Conference on Network, Communication and Computing","acronym":"ICNCC '16","location":"Kyoto Japan"},"container-title":["Proceedings of the Fifth International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3033288.3033296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3033288.3033296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:47Z","timestamp":1750217807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3033288.3033296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,17]]},"references-count":14,"alternative-id":["10.1145\/3033288.3033296","10.1145\/3033288"],"URL":"https:\/\/doi.org\/10.1145\/3033288.3033296","relation":{},"subject":[],"published":{"date-parts":[[2016,12,17]]},"assertion":[{"value":"2016-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}