Title: Security of e-data in sensitive information systems

Authors: Vladimir Šimović; Matija Varga; Marin Milković

Addresses: University North, Koprivnica, Trg dr. Žarka Dolinara 1, Croatia ' University North, Koprivnica, Trg dr. Žarka Dolinara 1, Croatia ' University North, Koprivnica, Trg dr. Žarka Dolinara 1, Croatia

Abstract: The paper shows the possibilities and ways to protect e-data in SIS. Nowadays, it is necessary to pay great attention to computer security. The paper presents the best way of protecting e-data in the database from malicious people, i.e., malicious users of these systems, and from the deterioration and obsolescence of data storage media with the data important for the organisation itself by making recommendations and showing the ways of their protection, explains the reason for creating a code of ethics for medical and health IT professionals. The information collected by using the questionnaire is shown. It can be concluded that most organisations use scanners and cameras to digitise documents, which are then usually stored in .pdf, .docx, and xml formats. The results of the research, which was conducted during the period of three weeks (plus two weeks) in 2012 and 2014 on the sample of nine organisations, show that there is no organisation that does not have a general policy of preserving the material in electronic form. A recommendation for the organisations is to back up electronic databases more often, or as many times as possible in the shortest period of time possible.

Keywords: sensitive information; financial information systems; data security; database backup; formats; saving records; e-data; data protection; malicious attacks; deterioration; obsolescence; data storage media; code of ethics; healthcare technology; data preservation; medical data.

DOI: 10.1504/IJIL.2015.072460

International Journal of Innovation and Learning, 2015 Vol.18 No.4, pp.487 - 517

Received: 02 Jan 2014
Accepted: 06 Jul 2014

Published online: 14 Oct 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article