How Good is a Security Policy against Real Breaches? A HIPAA Case Study
- Submitting institution
-
The University of Kent
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 13799
- Type
- E - Conference contribution
- DOI
-
10.1109/ICSE.2017.55
- Title of conference / published proceedings
- 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)
- First page
- 530
- Volume
- -
- Issue
- -
- ISSN
- 1558-1225
- Open access status
- Technical exception
- Month of publication
- July
- Year of publication
- 2017
- URL
-
https://kar.kent.ac.uk/65867/
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
4
- Research group(s)
-
-
- Citation count
- 11
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This work uses a formal representation to compute similarities among concepts to identify how well regulations account for breaches. This paper is significant because it is the first work to connect security-related artifacts, regulations (pre-deployment) and breach reports (post-deployment). Results on real-world data show human errors are not well-addressed in regulations.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -