Measuring the State of Information Security and Data Protection in Healthcare Web Applications Article Swipe
Julian Schallenberg
,
Romina Blasini
,
Keywan Sohrabi
,
Florian Eberhardt
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3233/shti250447
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3233/shti250447
The digitalization of healthcare requires robust information security and data protection measures. This work outlines a methodology for assessing these aspects using the Technical Guideline TR-03161-2 from the German Federal Office for Information Security (BSI). The approach involves comparing the current information security and data protection state of a healthcare web application against predefined requirements and identifying threats based on unmet criteria. Identified security deficits are quantified in economic cost terms through use of the Annualized Loss Expectancy (ALE) framework, providing a realistic assessment of the economic impact of information security and data protection risks.
Related Topics
Concepts
Information security
Data security
Health care
Computer security
Information security management
Work (physics)
Computer science
Standard of Good Practice
Risk analysis (engineering)
Guideline
Data Protection Act 1998
Security information and event management
Security service
Business
Cloud computing security
Cloud computing
Medicine
Engineering
Network security policy
Encryption
Economics
Operating system
Mechanical engineering
Pathology
Economic growth
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3233/shti250447
- https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447
- OA Status
- hybrid
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4410447970
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4410447970Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3233/shti250447Digital Object Identifier
- Title
-
Measuring the State of Information Security and Data Protection in Healthcare Web ApplicationsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-05-15Full publication date if available
- Authors
-
Julian Schallenberg, Romina Blasini, Keywan Sohrabi, Florian EberhardtList of authors in order
- Landing page
-
https://doi.org/10.3233/shti250447Publisher landing page
- PDF URL
-
https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447Direct OA link when available
- Concepts
-
Information security, Data security, Health care, Computer security, Information security management, Work (physics), Computer science, Standard of Good Practice, Risk analysis (engineering), Guideline, Data Protection Act 1998, Security information and event management, Security service, Business, Cloud computing security, Cloud computing, Medicine, Engineering, Network security policy, Encryption, Economics, Operating system, Mechanical engineering, Pathology, Economic growthTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4410447970 |
|---|---|
| doi | https://doi.org/10.3233/shti250447 |
| ids.doi | https://doi.org/10.3233/shti250447 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/40380556 |
| ids.openalex | https://openalex.org/W4410447970 |
| fwci | 0.0 |
| mesh[0].qualifier_ui | Q000592 |
| mesh[0].descriptor_ui | D016494 |
| mesh[0].is_major_topic | True |
| mesh[0].qualifier_name | standards |
| mesh[0].descriptor_name | Computer Security |
| mesh[1].qualifier_ui | |
| mesh[1].descriptor_ui | D005858 |
| mesh[1].is_major_topic | False |
| mesh[1].qualifier_name | |
| mesh[1].descriptor_name | Germany |
| mesh[2].qualifier_ui | Q000592 |
| mesh[2].descriptor_ui | D020407 |
| mesh[2].is_major_topic | True |
| mesh[2].qualifier_name | standards |
| mesh[2].descriptor_name | Internet |
| mesh[3].qualifier_ui | Q000592 |
| mesh[3].descriptor_ui | D003219 |
| mesh[3].is_major_topic | True |
| mesh[3].qualifier_name | standards |
| mesh[3].descriptor_name | Confidentiality |
| mesh[4].qualifier_ui | |
| mesh[4].descriptor_ui | D006801 |
| mesh[4].is_major_topic | False |
| mesh[4].qualifier_name | |
| mesh[4].descriptor_name | Humans |
| type | article |
| title | Measuring the State of Information Security and Data Protection in Healthcare Web Applications |
| biblio.issue | |
| biblio.volume | 327 |
| biblio.last_page | 744 |
| biblio.first_page | 743 |
| topics[0].id | https://openalex.org/T13022 |
| topics[0].field.id | https://openalex.org/fields/36 |
| topics[0].field.display_name | Health Professions |
| topics[0].score | 0.8720999956130981 |
| topics[0].domain.id | https://openalex.org/domains/4 |
| topics[0].domain.display_name | Health Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/3600 |
| topics[0].subfield.display_name | General Health Professions |
| topics[0].display_name | Health and Medical Studies |
| topics[1].id | https://openalex.org/T13423 |
| topics[1].field.id | https://openalex.org/fields/36 |
| topics[1].field.display_name | Health Professions |
| topics[1].score | 0.839900016784668 |
| topics[1].domain.id | https://openalex.org/domains/4 |
| topics[1].domain.display_name | Health Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/3600 |
| topics[1].subfield.display_name | General Health Professions |
| topics[1].display_name | Social Policies and Healthcare Reform |
| topics[2].id | https://openalex.org/T13364 |
| topics[2].field.id | https://openalex.org/fields/33 |
| topics[2].field.display_name | Social Sciences |
| topics[2].score | 0.8203999996185303 |
| topics[2].domain.id | https://openalex.org/domains/2 |
| topics[2].domain.display_name | Social Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3308 |
| topics[2].subfield.display_name | Law |
| topics[2].display_name | Digitalization, Law, and Regulation |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C527648132 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6606963872909546 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[0].display_name | Information security |
| concepts[1].id | https://openalex.org/C10511746 |
| concepts[1].level | 3 |
| concepts[1].score | 0.5549750328063965 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[1].display_name | Data security |
| concepts[2].id | https://openalex.org/C160735492 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5544259548187256 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q31207 |
| concepts[2].display_name | Health care |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5486647486686707 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C148976360 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5358238220214844 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1662500 |
| concepts[4].display_name | Information security management |
| concepts[5].id | https://openalex.org/C18762648 |
| concepts[5].level | 2 |
| concepts[5].score | 0.520687460899353 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q42213 |
| concepts[5].display_name | Work (physics) |
| concepts[6].id | https://openalex.org/C41008148 |
| concepts[6].level | 0 |
| concepts[6].score | 0.5119472742080688 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[6].display_name | Computer science |
| concepts[7].id | https://openalex.org/C47309137 |
| concepts[7].level | 5 |
| concepts[7].score | 0.4744965732097626 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7598357 |
| concepts[7].display_name | Standard of Good Practice |
| concepts[8].id | https://openalex.org/C112930515 |
| concepts[8].level | 1 |
| concepts[8].score | 0.45574048161506653 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[8].display_name | Risk analysis (engineering) |
| concepts[9].id | https://openalex.org/C2780182762 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4556853771209717 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1630279 |
| concepts[9].display_name | Guideline |
| concepts[10].id | https://openalex.org/C69360830 |
| concepts[10].level | 2 |
| concepts[10].score | 0.45415061712265015 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1172237 |
| concepts[10].display_name | Data Protection Act 1998 |
| concepts[11].id | https://openalex.org/C103377522 |
| concepts[11].level | 4 |
| concepts[11].score | 0.3777713179588318 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3493999 |
| concepts[11].display_name | Security information and event management |
| concepts[12].id | https://openalex.org/C29983905 |
| concepts[12].level | 3 |
| concepts[12].score | 0.361346960067749 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7445066 |
| concepts[12].display_name | Security service |
| concepts[13].id | https://openalex.org/C144133560 |
| concepts[13].level | 0 |
| concepts[13].score | 0.3427466154098511 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[13].display_name | Business |
| concepts[14].id | https://openalex.org/C184842701 |
| concepts[14].level | 3 |
| concepts[14].score | 0.33979296684265137 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q370563 |
| concepts[14].display_name | Cloud computing security |
| concepts[15].id | https://openalex.org/C79974875 |
| concepts[15].level | 2 |
| concepts[15].score | 0.16660451889038086 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[15].display_name | Cloud computing |
| concepts[16].id | https://openalex.org/C71924100 |
| concepts[16].level | 0 |
| concepts[16].score | 0.12844204902648926 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[16].display_name | Medicine |
| concepts[17].id | https://openalex.org/C127413603 |
| concepts[17].level | 0 |
| concepts[17].score | 0.1276467740535736 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[17].display_name | Engineering |
| concepts[18].id | https://openalex.org/C117110713 |
| concepts[18].level | 4 |
| concepts[18].score | 0.09022602438926697 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q3394676 |
| concepts[18].display_name | Network security policy |
| concepts[19].id | https://openalex.org/C148730421 |
| concepts[19].level | 2 |
| concepts[19].score | 0.07994455099105835 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[19].display_name | Encryption |
| concepts[20].id | https://openalex.org/C162324750 |
| concepts[20].level | 0 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q8134 |
| concepts[20].display_name | Economics |
| concepts[21].id | https://openalex.org/C111919701 |
| concepts[21].level | 1 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[21].display_name | Operating system |
| concepts[22].id | https://openalex.org/C78519656 |
| concepts[22].level | 1 |
| concepts[22].score | 0.0 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q101333 |
| concepts[22].display_name | Mechanical engineering |
| concepts[23].id | https://openalex.org/C142724271 |
| concepts[23].level | 1 |
| concepts[23].score | 0.0 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[23].display_name | Pathology |
| concepts[24].id | https://openalex.org/C50522688 |
| concepts[24].level | 1 |
| concepts[24].score | 0.0 |
| concepts[24].wikidata | https://www.wikidata.org/wiki/Q189833 |
| concepts[24].display_name | Economic growth |
| keywords[0].id | https://openalex.org/keywords/information-security |
| keywords[0].score | 0.6606963872909546 |
| keywords[0].display_name | Information security |
| keywords[1].id | https://openalex.org/keywords/data-security |
| keywords[1].score | 0.5549750328063965 |
| keywords[1].display_name | Data security |
| keywords[2].id | https://openalex.org/keywords/health-care |
| keywords[2].score | 0.5544259548187256 |
| keywords[2].display_name | Health care |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5486647486686707 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/information-security-management |
| keywords[4].score | 0.5358238220214844 |
| keywords[4].display_name | Information security management |
| keywords[5].id | https://openalex.org/keywords/work |
| keywords[5].score | 0.520687460899353 |
| keywords[5].display_name | Work (physics) |
| keywords[6].id | https://openalex.org/keywords/computer-science |
| keywords[6].score | 0.5119472742080688 |
| keywords[6].display_name | Computer science |
| keywords[7].id | https://openalex.org/keywords/standard-of-good-practice |
| keywords[7].score | 0.4744965732097626 |
| keywords[7].display_name | Standard of Good Practice |
| keywords[8].id | https://openalex.org/keywords/risk-analysis |
| keywords[8].score | 0.45574048161506653 |
| keywords[8].display_name | Risk analysis (engineering) |
| keywords[9].id | https://openalex.org/keywords/guideline |
| keywords[9].score | 0.4556853771209717 |
| keywords[9].display_name | Guideline |
| keywords[10].id | https://openalex.org/keywords/data-protection-act-1998 |
| keywords[10].score | 0.45415061712265015 |
| keywords[10].display_name | Data Protection Act 1998 |
| keywords[11].id | https://openalex.org/keywords/security-information-and-event-management |
| keywords[11].score | 0.3777713179588318 |
| keywords[11].display_name | Security information and event management |
| keywords[12].id | https://openalex.org/keywords/security-service |
| keywords[12].score | 0.361346960067749 |
| keywords[12].display_name | Security service |
| keywords[13].id | https://openalex.org/keywords/business |
| keywords[13].score | 0.3427466154098511 |
| keywords[13].display_name | Business |
| keywords[14].id | https://openalex.org/keywords/cloud-computing-security |
| keywords[14].score | 0.33979296684265137 |
| keywords[14].display_name | Cloud computing security |
| keywords[15].id | https://openalex.org/keywords/cloud-computing |
| keywords[15].score | 0.16660451889038086 |
| keywords[15].display_name | Cloud computing |
| keywords[16].id | https://openalex.org/keywords/medicine |
| keywords[16].score | 0.12844204902648926 |
| keywords[16].display_name | Medicine |
| keywords[17].id | https://openalex.org/keywords/engineering |
| keywords[17].score | 0.1276467740535736 |
| keywords[17].display_name | Engineering |
| keywords[18].id | https://openalex.org/keywords/network-security-policy |
| keywords[18].score | 0.09022602438926697 |
| keywords[18].display_name | Network security policy |
| keywords[19].id | https://openalex.org/keywords/encryption |
| keywords[19].score | 0.07994455099105835 |
| keywords[19].display_name | Encryption |
| language | en |
| locations[0].id | doi:10.3233/shti250447 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210179765 |
| locations[0].source.issn | 0926-9630, 1879-8365 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0926-9630 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Studies in health technology and informatics |
| locations[0].source.host_organization | https://openalex.org/P4310318577 |
| locations[0].source.host_organization_name | IOS Press |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310318577 |
| locations[0].source.host_organization_lineage_names | IOS Press |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Studies in Health Technology and Informatics |
| locations[0].landing_page_url | https://doi.org/10.3233/shti250447 |
| locations[1].id | pmid:40380556 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Studies in health technology and informatics |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/40380556 |
| indexed_in | crossref, pubmed |
| authorships[0].author.id | https://openalex.org/A5117573328 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Julian Schallenberg |
| authorships[0].countries | DE |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I45155027 |
| authorships[0].affiliations[0].raw_affiliation_string | Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I200763008 |
| authorships[0].affiliations[1].raw_affiliation_string | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany |
| authorships[0].institutions[0].id | https://openalex.org/I200763008 |
| authorships[0].institutions[0].ror | https://ror.org/033eqas34 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I200763008 |
| authorships[0].institutions[0].country_code | DE |
| authorships[0].institutions[0].display_name | Justus-Liebig-Universität Gießen |
| authorships[0].institutions[1].id | https://openalex.org/I45155027 |
| authorships[0].institutions[1].ror | https://ror.org/02qdc9985 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I45155027 |
| authorships[0].institutions[1].country_code | DE |
| authorships[0].institutions[1].display_name | Technische Hochschule Mittelhessen |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Julian Schallenberg |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany, Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| authorships[1].author.id | https://openalex.org/A5048106207 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1049-6102 |
| authorships[1].author.display_name | Romina Blasini |
| authorships[1].countries | DE |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I200763008 |
| authorships[1].affiliations[0].raw_affiliation_string | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany |
| authorships[1].institutions[0].id | https://openalex.org/I200763008 |
| authorships[1].institutions[0].ror | https://ror.org/033eqas34 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I200763008 |
| authorships[1].institutions[0].country_code | DE |
| authorships[1].institutions[0].display_name | Justus-Liebig-Universität Gießen |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Romina Blasini |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany |
| authorships[2].author.id | https://openalex.org/A5103096257 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6279-6097 |
| authorships[2].author.display_name | Keywan Sohrabi |
| authorships[2].countries | DE |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I45155027 |
| authorships[2].affiliations[0].raw_affiliation_string | Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| authorships[2].institutions[0].id | https://openalex.org/I45155027 |
| authorships[2].institutions[0].ror | https://ror.org/02qdc9985 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I45155027 |
| authorships[2].institutions[0].country_code | DE |
| authorships[2].institutions[0].display_name | Technische Hochschule Mittelhessen |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Keywan Sohrabi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| authorships[3].author.id | https://openalex.org/A5117573329 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Florian Eberhardt |
| authorships[3].countries | DE |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I45155027 |
| authorships[3].affiliations[0].raw_affiliation_string | Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| authorships[3].affiliations[1].institution_ids | https://openalex.org/I200763008 |
| authorships[3].affiliations[1].raw_affiliation_string | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany |
| authorships[3].institutions[0].id | https://openalex.org/I200763008 |
| authorships[3].institutions[0].ror | https://ror.org/033eqas34 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I200763008 |
| authorships[3].institutions[0].country_code | DE |
| authorships[3].institutions[0].display_name | Justus-Liebig-Universität Gießen |
| authorships[3].institutions[1].id | https://openalex.org/I45155027 |
| authorships[3].institutions[1].ror | https://ror.org/02qdc9985 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I45155027 |
| authorships[3].institutions[1].country_code | DE |
| authorships[3].institutions[1].display_name | Technische Hochschule Mittelhessen |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Florian Eberhardt |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Data Integration Center, Institute of medical informatics, Justus-Liebig-University Giessen, Germany, Faculty of health sciences, University of Applied Sciences Mittelhessen, site Giessen, Germany |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Measuring the State of Information Security and Data Protection in Healthcare Web Applications |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T13022 |
| primary_topic.field.id | https://openalex.org/fields/36 |
| primary_topic.field.display_name | Health Professions |
| primary_topic.score | 0.8720999956130981 |
| primary_topic.domain.id | https://openalex.org/domains/4 |
| primary_topic.domain.display_name | Health Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/3600 |
| primary_topic.subfield.display_name | General Health Professions |
| primary_topic.display_name | Health and Medical Studies |
| related_works | https://openalex.org/W2033357182, https://openalex.org/W2376792395, https://openalex.org/W2362334938, https://openalex.org/W1557523735, https://openalex.org/W2394290376, https://openalex.org/W2370581992, https://openalex.org/W2354737822, https://openalex.org/W2379320583, https://openalex.org/W2800653357, https://openalex.org/W2767454858 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.3233/shti250447 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210179765 |
| best_oa_location.source.issn | 0926-9630, 1879-8365 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0926-9630 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Studies in health technology and informatics |
| best_oa_location.source.host_organization | https://openalex.org/P4310318577 |
| best_oa_location.source.host_organization_name | IOS Press |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310318577 |
| best_oa_location.source.host_organization_lineage_names | IOS Press |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Studies in Health Technology and Informatics |
| best_oa_location.landing_page_url | https://doi.org/10.3233/shti250447 |
| primary_location.id | doi:10.3233/shti250447 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210179765 |
| primary_location.source.issn | 0926-9630, 1879-8365 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0926-9630 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Studies in health technology and informatics |
| primary_location.source.host_organization | https://openalex.org/P4310318577 |
| primary_location.source.host_organization_name | IOS Press |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310318577 |
| primary_location.source.host_organization_lineage_names | IOS Press |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | https://ebooks.iospress.nl/pdf/doi/10.3233/SHTI250447 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Studies in Health Technology and Informatics |
| primary_location.landing_page_url | https://doi.org/10.3233/shti250447 |
| publication_date | 2025-05-15 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 15, 48, 81 |
| abstract_inverted_index.in | 67 |
| abstract_inverted_index.of | 2, 47, 73, 84, 88 |
| abstract_inverted_index.on | 59 |
| abstract_inverted_index.The | 0, 35 |
| abstract_inverted_index.and | 8, 43, 55, 91 |
| abstract_inverted_index.are | 65 |
| abstract_inverted_index.for | 17, 31 |
| abstract_inverted_index.the | 22, 27, 39, 74, 85 |
| abstract_inverted_index.use | 72 |
| abstract_inverted_index.web | 50 |
| abstract_inverted_index.Loss | 76 |
| abstract_inverted_index.This | 12 |
| abstract_inverted_index.cost | 69 |
| abstract_inverted_index.data | 9, 44, 92 |
| abstract_inverted_index.from | 26 |
| abstract_inverted_index.work | 13 |
| abstract_inverted_index.(ALE) | 78 |
| abstract_inverted_index.based | 58 |
| abstract_inverted_index.state | 46 |
| abstract_inverted_index.terms | 70 |
| abstract_inverted_index.these | 19 |
| abstract_inverted_index.unmet | 60 |
| abstract_inverted_index.using | 21 |
| abstract_inverted_index.(BSI). | 34 |
| abstract_inverted_index.German | 28 |
| abstract_inverted_index.Office | 30 |
| abstract_inverted_index.impact | 87 |
| abstract_inverted_index.risks. | 94 |
| abstract_inverted_index.robust | 5 |
| abstract_inverted_index.Federal | 29 |
| abstract_inverted_index.against | 52 |
| abstract_inverted_index.aspects | 20 |
| abstract_inverted_index.current | 40 |
| abstract_inverted_index.threats | 57 |
| abstract_inverted_index.through | 71 |
| abstract_inverted_index.Security | 33 |
| abstract_inverted_index.approach | 36 |
| abstract_inverted_index.deficits | 64 |
| abstract_inverted_index.economic | 68, 86 |
| abstract_inverted_index.involves | 37 |
| abstract_inverted_index.outlines | 14 |
| abstract_inverted_index.requires | 4 |
| abstract_inverted_index.security | 7, 42, 63, 90 |
| abstract_inverted_index.Guideline | 24 |
| abstract_inverted_index.Technical | 23 |
| abstract_inverted_index.assessing | 18 |
| abstract_inverted_index.comparing | 38 |
| abstract_inverted_index.criteria. | 61 |
| abstract_inverted_index.measures. | 11 |
| abstract_inverted_index.providing | 80 |
| abstract_inverted_index.realistic | 82 |
| abstract_inverted_index.Annualized | 75 |
| abstract_inverted_index.Expectancy | 77 |
| abstract_inverted_index.Identified | 62 |
| abstract_inverted_index.TR-03161-2 | 25 |
| abstract_inverted_index.assessment | 83 |
| abstract_inverted_index.framework, | 79 |
| abstract_inverted_index.healthcare | 3, 49 |
| abstract_inverted_index.predefined | 53 |
| abstract_inverted_index.protection | 10, 45, 93 |
| abstract_inverted_index.quantified | 66 |
| abstract_inverted_index.Information | 32 |
| abstract_inverted_index.application | 51 |
| abstract_inverted_index.identifying | 56 |
| abstract_inverted_index.information | 6, 41, 89 |
| abstract_inverted_index.methodology | 16 |
| abstract_inverted_index.requirements | 54 |
| abstract_inverted_index.digitalization | 1 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5799999833106995 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.37516663 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |