Security Quality Measurement Based on ISO/IEC 25023 Quality Model Case Study: Hospital Management Information System

  • Nungky Taniasari Faculty of Health Science, Universitas Anwar Medika, Sidoarjo, Indonesia
  • Mohamad Shodikin Faculty of Sciences and Technology, Universitas Anwar Medika, Sidoarjo, Indonesia
Keywords: Hospital Management, Information System, Security Audit

Abstract

Hospitals need to protect the security of data assets, where data assets are an important part of the continuity of hospital operations. In connection with the protection of data and information assets in the hospital, it has become a requirement for the hospital information technology team to carry out a security audit of the hospital management information system (HMIS). In this study, we measured the quality of the HMIS software in X Hospital using ISO 25023 which focused on the security aspects of the outpatient service module and drug services in the outpatient pharmacy unit. The security aspect based on the ISO 25023 standard consists of five main characteristics, namely: confidentiality, integrity, non-repudiation, accountability and authenticity. In the early stages, calculations are carried out to find the value of each measurement standard which is denoted by (X). The X value is based on the standard calculation range of values 0 and 1. The threshold value is determined at 0.80 to categorize the point quality whether it is not good or has met the ISO 25023 quality point. The results of software quality measurements show Internal Data Corruption Prevention is worth 0.75 and is at below a predetermined threshold value. Based on these results, it is recommended to improve one of them by replication the database to minimize the possibility of Internal Data Corruption Prevention. In this study, all aspects of software quality have an average value above the threshold, so it can be concluded that HMIS in RS X meets ISO 25023 standards.

References

Adamu, J., Hamzah, R., & Rosli, M. M. (2020). Security issues and framework of electronic medical record: A review. Bulletin of Electrical Engineering and Informatics, 9(2), 565-572. https://doi.org/10.11591/eei.v9i2.2064

Amankwah, M. A. B. (2019). Assessment of Electronic Health Management Information System at University of Ghana Hospital (Doctoral dissertation, University of Ghana).

Amrullah, A. (2023). BELAJAR CEPAT DATABASE NoSQL: Menggunakan Document Oriented Database (MongoDB) pada Pengaplikasian Big Data. Penerbit Andi.

Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.

Aziz, M. N., Sapta, I. M., & Rochimah, S. (2018, October). Security characteristic evaluation based on ISO/IEC 25023 quality model, case study: Laboratory management information system. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 332-336). IEEE. https://doi.org/10.1109/EECCIS.2018.8692982

Bairavasundaram, L. N., Arpaci-Dusseau, A. C., Arpaci-Dusseau, R. H., Goodson, G. R., & Schroeder, B. (2008). An analysis of data corruption in the storage stack. ACM Transactions on Storage (TOS), 4(3), 1–28. https://dl.acm.org/doi/abs/10.1145/1416944.1416947

Bohannon, P., Rastogi, R., Seshadri, S., Silberschatz, A., & Sudarshan, S. (2003). Detection and recovery techniques for database corruption. IEEE Transactions on Knowledge and Data Engineering, 15(5), 1120–1136. https://doi.org/10.1109/TKDE.2003.1232268

Correa, E. B. E., Sousa, J. C., Abelém, A. J. G., & Oliveira, S. R. B. (2022). An evaluation of Security Features based on Iso/Iec 25023 for a Distributed Autonomic Scientific Publisher Tool on a Permissioned Blockchain. JISTEM-Journal of Information Systems and Technology Management, 19, e202219020. https://doi.org/10.4301/S1807-1775202219020

Craig, S., Crane, V. S., Hayman, J. N., Hoffman, R., & Hatwig, C. A. (2001). Developing a service excellence system for ambulatory care pharmacy services. American journal of health-system pharmacy, 58(17), 1597-1606. https://doi.org/10.1093/ajhp/58.17.1597

Da-gang, G. (2009). Analysis of model-based mvc framework for php development codeigniter. Jiangxi Sci, 5, 22.

Das, M. L., & Samdaria, N. (2014). On the security of SSL/TLS-enabled applications. Applied Computing and Informatics, 10(1–2), 68–81. https://doi.org/10.1016/j.aci.2014.02.001

Ganji, D., Kalloniatis, C., Mouratidis, H., & Gheytassi, S. M. (2019). Approaches to develop and implement iso/iec 27001 standard-information security management systems: A systematic literature review. Int. J. Adv. Softw, 12(3).

Kemboi, L. (2020). Security control model for electronic health records (Doctoral dissertation).

Komiyama, T., Fukuzumi, S. I., Azuma, M., Washizaki, H., & Tsuda, N. (2020). Usability of software–intensive systems from developers’ point of view: Current status and future perspectives of international standardization of usability evaluation. In Human-Computer Interaction. Design and User Experience: Thematic Area, HCI 2020, Held as Part of the 22nd International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part I 22 (pp. 450-463). Springer International Publishing. https://doi.org/10.1007/978-3-030-49059-1_33

Maulana, M. S., Sabaruddin, R., & Nurmalasari, N. (2020). Rancang bangun dashboard smart system manajemen rt/rw untuk mendukung society 5.0. JUSTIN (Jurnal Sistem Dan Teknologi Informasi), 8(4), 328–332. http://dx.doi.org/10.26418/justin.v8i4.42586

Nasional, B. S. (2009). Pengantar standardisasi. Jakarta: BSN, 198.

Pravika, U. H. (2019). Implementasi hiperkes dan keselamatan kerja serta lingkungan di PT aNtam Tbk. Ubpe Pongkor.

Saidhi, R., Derta, S., Musril, H. A., & Okra, R. (2023). PERANCANGAN APLIKASI VIDTORGA PADA MATAPELAJARAN PJOK KELAS X DI SMKN 1 AMPEK ANGKEK. Jurnal Pendidikan Teknologi Informasi (JUKANTI), 6(2), 222–246. https://doi.org/10.37792/jukanti.v6i2.1004

Saptarini, I., Rochimah, S., & Yuhana, U. L. (2017). Security Quality Measurement Framework for Academic Information System (AIS) Based on ISO/IEC 25010 Quality Model. IPTEK Journal of Proceedings Series, 3(2), 128-135. http://dx.doi.org/10.12962/j23546026.y2017i2.2310

Shooman, A. M., & Shooman, M. L. (2012). A comparison of RAID storage schemes: Reliability and efficiency. 2012 Proceedings Annual Reliability and Maintainability Symposium, 1–6. https://doi.org/10.1109/RAMS.2012.6175446

Solanki, N. V, Solanki, D. B., & Shah, R. R. (2017). Patient Satisfaction with Services in Out-Patient Department at Tertiary Care Hospital of Patan District, Gujarat. National Journal of Community Medicine, 8(06), 334–337.

Xu, H., Heijmans, J., & Visser, J. (2013). A practical model for rating software security. 2013 IEEE Seventh International Conference on Software Security and Reliability Companion, 231–232. https://doi.org/10.1109/SERE-C.2013.11

Yuhana Ashikin, G. (2005). Hospital management information system/Yuhana Ashikin Ghazali (Doctoral dissertation, Universiti Malaya).

Published
2024-11-06
How to Cite
Taniasari, N., & Shodikin, M. (2024). Security Quality Measurement Based on ISO/IEC 25023 Quality Model Case Study: Hospital Management Information System. Journal La Multiapp, 5(5), 732-739. https://doi.org/10.37899/journallamultiapp.v5i5.1626