{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:07:39Z","timestamp":1752984459313,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This work was partly funded by the IntelTriage project (Intelligent triage system for hospital emergency departments and clinics) which in turn has received funding from the Ministry of Economy & Development, Special Secretary for ERDF & CF, Managing Authority of EPAnEK Competitiveness Entrepreneurship Innovation operational program, under grant agreement (MIS 5030447).","award":["MIS 5030447"],"award-info":[{"award-number":["MIS 5030447"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503823.3503913","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T22:15:51Z","timestamp":1645568151000},"page":"495-499","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Methodology for Adopting Security Management Principles in Health Sector Environments"],"prefix":"10.1145","author":[{"given":"Theodoros","family":"Karvounidis","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Piraeus, Greece"}]},{"given":"Dimitrios","family":"Kallergis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Computer Engineering, University of West Attika, Greece"}]},{"given":"Zacharenia","family":"Garofalaki","sequence":"additional","affiliation":[{"name":"Department of Informatics and Computer Engineering, University of West Attika, Greece"}]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Piraeus, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.4108\/eai.13-7-2018.155079"},{"key":"e_1_3_2_1_2_1","first-page":"61","volume-title":"Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals, Health Inform Research 2018 January, 24, 1","author":"Kim Yong-Woon","year":"2018","unstructured":"Yong-Woon Kim , Namin Cho and Hye-Jung Jang , Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals, Health Inform Research 2018 January, 24, 1 , 61 - 68 , doi:10.4258\/hir. 2018 .24.1.61 10.4258\/hir.2018.24.1.61 Yong-Woon Kim, Namin Cho and Hye-Jung Jang, Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals, Health Inform Research 2018 January, 24, 1, 61-68, doi:10.4258\/hir.2018.24.1.61"},{"doi-asserted-by":"crossref","unstructured":"Jyri Rajam\u00e4ki Julia Nevmerzhitskaya and Csaba Vir\u00e1g. Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF) \" 2018 IEEE Global Engineering Education Conference (EDUCON) 2018 pp. 2042-2046 doi: 10.1109\/EDUCON.2018.8363488. 10.1109\/EDUCON.2018.8363488","key":"#cr-split#-e_1_3_2_1_3_1.1","DOI":"10.1109\/EDUCON.2018.8363488"},{"doi-asserted-by":"crossref","unstructured":"Jyri Rajam\u00e4ki Julia Nevmerzhitskaya and Csaba Vir\u00e1g. Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF) \" 2018 IEEE Global Engineering Education Conference (EDUCON) 2018 pp. 2042-2046 doi: 10.1109\/EDUCON.2018.8363488.","key":"#cr-split#-e_1_3_2_1_3_1.2","DOI":"10.1109\/EDUCON.2018.8363488"},{"key":"e_1_3_2_1_4_1","volume-title":"Alqahtani. Dynamic Interpretation Approaches for Information Security Risk Assessment, 2019 International Conference on Computer and Information Sciences (ICCIS)","author":"Alhajri Reem M.","year":"2019","unstructured":"Reem M. Alhajri , Shikah J. Alsunaidi , Rachid Zagrouba , Abdullah M. Almuhaideb and Mohammed A . Alqahtani. Dynamic Interpretation Approaches for Information Security Risk Assessment, 2019 International Conference on Computer and Information Sciences (ICCIS) , 2019 , 1-6, doi: 10.1109\/ICCISci.2019.8716399. 10.1109\/ICCISci.2019.8716399 Reem M. Alhajri, Shikah J. Alsunaidi, Rachid Zagrouba, Abdullah M. Almuhaideb and Mohammed A. Alqahtani. Dynamic Interpretation Approaches for Information Security Risk Assessment, 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, 1-6, doi: 10.1109\/ICCISci.2019.8716399."},{"key":"e_1_3_2_1_5_1","volume-title":"Information technology \u2014 Security techniques \u2014 Information security risk management","author":"IEC","year":"2018","unstructured":"ISO\/ IEC 27005:2018 : Information technology \u2014 Security techniques \u2014 Information security risk management , Geneva, Switzerland , 2018 . ISO\/IEC 27005:2018: Information technology \u2014 Security techniques \u2014 Information security risk management, Geneva, Switzerland, 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"Last accessed","author":"Wikipedia IEC","year":"2021","unstructured":"ISO\/ IEC 27005.\u201d Wikipedia , Last accessed 13 Oct. 2021 , https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27005. ISO\/IEC 27005.\u201d Wikipedia, Last accessed 13 Oct. 2021, https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27005."},{"doi-asserted-by":"crossref","unstructured":"Othmar O. Mwambe and Isao Echizen \"Security Oriented Malicious Activity Diagrams to Support Information Systems Security \" 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2017 74-81 doi: 10.1109\/WAINA.2017.51. 10.1109\/WAINA.2017.51","key":"#cr-split#-e_1_3_2_1_7_1.1","DOI":"10.1109\/WAINA.2017.51"},{"doi-asserted-by":"crossref","unstructured":"Othmar O. Mwambe and Isao Echizen \"Security Oriented Malicious Activity Diagrams to Support Information Systems Security \" 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2017 74-81 doi: 10.1109\/WAINA.2017.51.","key":"#cr-split#-e_1_3_2_1_7_1.2","DOI":"10.1109\/WAINA.2017.51"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TEMSCON.2018.8488449"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"914","article-title":"-based Risk Treatment Plan to Prevent Patients Data Theft","volume":"10","author":"Hamita Laura Cassandra","year":"2011","unstructured":"Laura Cassandra Hamita , Haslina Sarkanb , Nurulhuda Firdaus Mohd Azmi , Mohd Naz'ri , Mahrinb, Suriayati Chupratb and Yazriwati Yahyab . Adopting ISO\/IEC 27005 : 2011 -based Risk Treatment Plan to Prevent Patients Data Theft , International Journal on Advanced Science, Engineering and Information Technology , 10 , 3 , 914 - 919 , DOI:10.18517\/ijaseit.10.3.10172, DOI: 10.18517\/ijaseit.10.3.10172, 2020 10.18517\/ijaseit.10.3.10172 Laura Cassandra Hamita, Haslina Sarkanb,Nurulhuda Firdaus Mohd Azmi, Mohd Naz'ri, Mahrinb, Suriayati Chupratb and Yazriwati Yahyab. Adopting ISO\/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft, International Journal on Advanced Science, Engineering and Information Technology, 10, 3, 914-919, DOI:10.18517\/ijaseit.10.3.10172, DOI: 10.18517\/ijaseit.10.3.10172, 2020","journal-title":"International Journal on Advanced Science, Engineering and Information Technology"},{"key":"e_1_3_2_1_10_1","volume-title":"doi: 10.23919\/ISTAFRICA.2017.8102376","author":"Tjirare Diana Jogbeth","year":"2017","unstructured":"Diana Jogbeth Tjirare and Fungai Bhunu Shava , \" A gap analysis of the ISO\/IEC 27000 standard implementation in Namibia ,\" 2017 IST- Africa Week Conference (IST-Africa), 1-10 , doi: 10.23919\/ISTAFRICA.2017.8102376 , 2017 10.23919\/ISTAFRICA.2017.8102376 Diana Jogbeth Tjirare and Fungai Bhunu Shava, \"A gap analysis of the ISO\/IEC 27000 standard implementation in Namibia,\" 2017 IST-Africa Week Conference (IST-Africa), 1-10, doi: 10.23919\/ISTAFRICA.2017.8102376, 2017"},{"key":"e_1_3_2_1_11_1","volume-title":"Information technology - Security techniques - Information security management systems \u2013 Requirements","author":"IEC","year":"2013","unstructured":"ISO\/ IEC 27001:2013 : Information technology - Security techniques - Information security management systems \u2013 Requirements , International Organization for Standardization , Geneva, Switzerland , 2013 . ISO\/IEC 27001:2013: Information technology - Security techniques - Information security management systems \u2013 Requirements, International Organization for Standardization, Geneva, Switzerland, 2013."},{"key":"e_1_3_2_1_12_1","volume-title":"Public Health Informatics and Information Systems","author":"Dixon J.","year":"2020","unstructured":"Magnuson, J. and Dixon , B . Public Health Informatics and Information Systems . Cham : Springer Nature , 2020 . Magnuson, J. and Dixon, B. Public Health Informatics and Information Systems. Cham: Springer Nature, 2020."}],"event":{"acronym":"PCI 2021","name":"PCI 2021: 25th Pan-Hellenic Conference on Informatics","location":"Volos Greece"},"container-title":["25th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503913","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503823.3503913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:31Z","timestamp":1750188631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503823.3503913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":14,"alternative-id":["10.1145\/3503823.3503913","10.1145\/3503823"],"URL":"https:\/\/doi.org\/10.1145\/3503823.3503913","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}