<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">IJMR</journal-id>
            <journal-id journal-id-type="nlm-ta">Interact J Med Res</journal-id>
            <journal-title>interactive Journal of Medical Research</journal-title>
            <issn pub-type="epub">1929-073X</issn>
            <publisher>
                <publisher-name>JMIR Publications Inc.</publisher-name>
                <publisher-loc>Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="pmid">23611956</article-id>
            <article-id pub-id-type="publisher-id">v1i2e11</article-id>
            <article-id pub-id-type="doi">10.2196/ijmr.2137</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Original Paper</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Assessing and Comparing Information Security in Swiss Hospitals</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>von Solms</surname>
                        <given-names>Basie</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes">
                    <name name-style="western">
                        <surname>Landolt</surname>
                        <given-names>Sarah</given-names>
                    </name>
                    <degrees>MSc</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>AAC Infotray</institution>
                        <addr-line>Zur Kesselschmiede 31</addr-line>
                        <addr-line>Winterthur, CH-8400</addr-line>
                        <country>Switzerland</country>
                        <phone>41 52 260 3162</phone>
                        <fax>41 52 203 6929</fax>
                        <email>sarah.landolt@alumni.ethz.ch</email>
                    </address>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Hirschel</surname>
                        <given-names>J&#252;rg</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Schlienger</surname>
                        <given-names>Thomas</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff3">3</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib4">
                    <name name-style="western">
                        <surname>Businger</surname>
                        <given-names>Walter</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff4">4</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib5">
                    <name name-style="western">
                        <surname>Zbinden</surname>
                        <given-names>Alex M</given-names>
                    </name>
                    <degrees>MD, PhD</degrees>
                    <xref ref-type="aff" rid="aff5">5</xref>
                </contrib>
            </contrib-group>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>AAC Infotray</institution>
                <addr-line>Winterthur</addr-line>
                <country>Switzerland</country>
            </aff>
            <aff id="aff2" rid="aff2">
                <sup>2</sup>
                <institution>Ypsomed AG</institution>
                <addr-line>Burgdorf</addr-line>
                <country>Switzerland</country>
            </aff>
            <aff id="aff3" rid="aff3">
                <sup>3</sup>
                <institution>TreeSolution Consulting GmbH</institution>
                <addr-line>H&#252;nenberg</addr-line>
                <country>Switzerland</country>
            </aff>
            <aff id="aff4" rid="aff4">
                <sup>4</sup>
                <institution>Engineering and Information Technology</institution>
                <institution>Bern University of Applied Sciences</institution>
                <addr-line>Bern</addr-line>
                <country>Switzerland</country>
            </aff>
            <aff id="aff5" rid="aff5">
                <sup>5</sup>
                <institution>Medical Technology Center</institution>
                <institution>Bern University of Applied Sciences</institution>
                <addr-line>Bern</addr-line>
                <country>Switzerland</country>
            </aff>
            <author-notes>
                <corresp>Corresponding Author: Sarah Landolt 
<email>sarah.landolt@alumni.ethz.ch</email>
                </corresp>
            </author-notes>
            <pub-date pub-type="collection">
                <season>Jul-Dec</season>
                <year>2012</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>07</day>
                <month>11</month>
                <year>2012</year>
            </pub-date>
            <volume>1</volume>
            <issue>2</issue>
            <elocation-id>e11</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>16</day>
                    <month>04</month>
                    <year>2012</year>
                </date>
                <date date-type="rev-request">
                    <day>14</day>
                    <month>06</month>
                    <year>2012</year>
                </date>
                <date date-type="rev-recd">
                    <day>28</day>
                    <month>07</month>
                    <year>2012</year>
                </date>
                <date date-type="accepted">
                    <day>25</day>
                    <month>09</month>
                    <year>2012</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Sarah Landolt, J&#252;rg Hirschel, Thomas Schlienger, Walter Businger, Alex M. Zbinden. Originally published in the Interactive Journal of Medical Research (http://www.i-jmr.org/), 07.11.2012. </copyright-statement>
            <copyright-year>2012</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Interactive Journal of Medical Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.i-jmr.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.i-jmr.org/2012/2/e11/" xlink:type="simple" />
            <abstract>
                <sec sec-type="background">
                    <title>Background</title>
                    <p>Availability of information in hospitals is an important prerequisite for good service. Significant resources have been invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed.</p>
                </sec>
                <sec sec-type="objective">
                    <title>Objective</title>
                    <p>The goal of this study was to assess information security in hospitals through a questionnaire based on the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002, evaluating <italic>Information technology &#8211; Security techniques &#8211; Code of practice for information-security management</italic>, with a special focus on the effect of the hospitals&#8217; size and type.</p>
                </sec>
                <sec sec-type="methods">
                    <title>Methods</title>
                    <p>The survey, set up as a cross-sectional study, was conducted in January 2011. The chief information officers (CIOs) of 112 hospitals in German-speaking Switzerland were invited to participate. The online questionnaire was designed to be fast and easy to complete to maximize participation. To group the analyzed controls of the ISO/IEC standard 27002 in a meaningful way, a factor analysis was performed. A linear score from 0 (not implemented) to 3 (fully implemented) was introduced. The scores of the hospitals were then analyzed for significant differences in any of the factors with respect to size and type of hospital. The participating hospitals were offered a benchmark report about their status.</p>
                </sec>
                <sec sec-type="results">
                    <title>Results</title>
                    <p>The 51 participating hospitals had an average score of 51.1% (range 30.6%&#160;-&#160;81.9%) out of a possible 100% where all items in the questionnaire were fully implemented. Room for improvement could be identified, especially for the factors covering &#8220;process and quality management&#8221; (average score 1.3&#160;&#177;&#160;0.8 out of a maximum of 3) and &#8220;organization and risk management&#8221; (average score 1.3&#160;&#177;&#160;0.7 out of a maximum of 3). Private hospitals scored significantly higher than university hospitals in the implementation of &#8220;security zones&#8221; and &#8220;backup&#8221; (<italic>P</italic>&#160;=&#160;.008).</p>
                </sec>
                <sec sec-type="conclusions">
                    <title>Conclusions</title>
                    <p>Half (50.00%, 8588/17,177) of all assessed hospital beds in German-speaking Switzerland are in hospitals that have a score of 49% or less of the maximum possible score in information security. Patient data need to be better protected because of the data protection laws and because sensitive, personal data should be guaranteed confidentiality, integrity, and availability.</p>
                </sec>
            </abstract>
            <kwd-group>
                <kwd>information security</kwd>
                <kwd>information protection</kwd>
                <kwd>computer security standards</kwd>
                <kwd>electronic health records organization &#38; administration</kwd>
                <kwd>hospital information systems</kwd>
                <kwd>Switzerland.</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>Information management, especially in emergency medicine, enhances the instantaneous and ubiquitous availability of digital patient records and can significantly improve clinical practice [<xref ref-type="bibr" rid="ref1">1</xref>]. On the other hand, poor patient data security represents a major problem that must be addressed with more sophisticated hospital information technology (HIT) [<xref ref-type="bibr" rid="ref2">2</xref>], but the protection of information represents a growing challenge [<xref ref-type="bibr" rid="ref3">3</xref>]. For example, it is increasingly difficult to safeguard the integrity of digital radiology images and protect them from unauthorized manipulation [<xref ref-type="bibr" rid="ref4">4</xref>]. Furthermore, the growing integration of complex hospital information systems [<xref ref-type="bibr" rid="ref5">5</xref>], the widespread use of mobile devices [<xref ref-type="bibr" rid="ref6">6</xref>], and the increasing amount of communication between health care providers require special attention regarding information security.</p>
            <p>To implement an adequate information-security management system, it is first necessary to evaluate information security and assess its risks, and subsequently to find suitable measures to control risks and improve security measures [<xref ref-type="bibr" rid="ref7">7</xref>]. TheInternational Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) have defined the international standards for information and data security (ISO/IEC 2700x, <italic>Information technology &#8211; Security techniques</italic>) that are widely accepted and can be used to evaluate levels of security [<xref ref-type="bibr" rid="ref8">8</xref>]. The standards identify three main components of information security: confidentiality, availability, and integrity. They also describe requirements for an information-security management system (ISO/IEC 27001), a code of practice (ISO/IEC 27002) [<xref ref-type="bibr" rid="ref9">9</xref>], implementation guidelines (ISO/IEC 27003), parameters to be measured (ISO/IEC 27004), and risk management (ISO/IEC 27005).</p>
            <p>Education is an important component of successful management of information security [<xref ref-type="bibr" rid="ref10">10</xref>]. To determine appropriate actions and education efforts, chief information officers (CIOs) need to know the status quo in their organization and have both a measuring tool and benchmark values at their disposal. However, no study has compared hospitals with respect to information security. This might be because information about the security level of an institution is delicate and might influence the hospital&#8217;s perceived trustworthiness or that assessing it might itself be a security threat. The lack of an effective benchmark tool for the assessment of the status quo of information security may be another explanation for the absence of such comparisons: The comprehensive and time-intensive character of commercially available tools, such as Verinice [<xref ref-type="bibr" rid="ref11">11</xref>], rules out their use for a widescale comparison of hospitals.</p>
            <p>Switzerland has a national implementation strategy for efficient and safe eHealth systems in which, for reasons of legal rights and acceptability, information security plays a central role [<xref ref-type="bibr" rid="ref12">12</xref>]. The goal of this study is to evaluate the current status of information security in Swiss hospitals. As a first step, an ISO/IEC 27002-compliant tool that allows for both a rapid nationwide assessment of hospital security and the provision of benchmark data for CIOs was developed. By using this tool, the present investigation aims to evaluate information security focusing on differences between hospitals of different sizes and types (ie, private vs public hospitals and academic vs non-academic hospitals).</p>
        </sec>
        <sec sec-type="methods">
            <title>Methods</title>
            <sec>
                <title>Questionnaire</title>
                <p>The goal was to develop an online questionnaire that covered most chapters of the ISO/IEC standard 27002, <italic>Information technology &#8211; Security techniques &#8211; Code of practice for information-security management</italic>, and required less than 20&#160;minutes to fill out. The online &#8220;EFS Survey&#8221; tool [<xref ref-type="bibr" rid="ref13">13</xref>] was used to design and host the questionnaire. The questionnaire incorporated 24 parameters defined in the ISO/IEC 27002 standard, <italic>Information technology &#8211; Security techniques &#8211; Code of practice for information-security management</italic>, with some parameters combined into one question (see <xref ref-type="app" rid="app1">Appendix 1</xref> for the complete set of questions with the corresponding chapters of the standard). All questions were identically structured and had four possible answers: (1) &#8220;unknown/not implemented,&#8221; (2) &#8220;partially implemented,&#8221; (3) &#8220;completely implemented,&#8221; and (4) &#8220;completely implemented and continuously monitored and improved.&#8221; The same layout and order of answers was used for all questions to reduce visual complexity. The questionnaire consisted of 19 screens, with 2 questions displayed on each screen. Questions regarding general parameters of the hospital, such as type of hospital, number of beds, number of full-time equivalents (FTEs) of job positions, total number of employees, number of FTEs in information technology (IT), total number of employees in IT, and number of computer workstations at the hospital, were assessed before the actual questionnaire. The questionnaire was reviewed by several national experts from the fields of medical informatics and information security not directly involved in the survey. To ensure technical functionality, the questionnaire was comprehensively tested by three test participants prior to its distribution.</p>
                <p>The CIOs of all 112 hospitals in the German-speaking portion of Switzerland were informed via email about the planned study 6 months before its inception. They were also informed that the study would be conducted by students of a Master of Advanced Studies in Medical Informatics at the Berne University of Applied Science. The survey was announced a second time in a personal letter [<xref ref-type="bibr" rid="ref14">14</xref>] and, 2 weeks later, a third time via a personal email that contained a hyperlink with a personal key. Participants were informed in the correspondence that the survey should take a maximum of 15 to 20 minutes to complete and that confidential treatment of data was guaranteed.</p>
                <p>To encourage timely responses, a genographic test from National Geographic [<xref ref-type="bibr" rid="ref15">15</xref>] was offered as draw prize to one of the first 50 participants. Furthermore, the participants were ensured a detailed benchmark analysis. Participants were asked to respond within 2 months. To improve the response rate, two reminder emails were sent out 10 days after this 2-month period and again 1 week later.</p>
                <p>The participants gave informed consent by affirming the opening question of the questionnaire: &#8220;Do you agree to participate in our survey? And do you give your consent that the data may be published in an anonymized form?&#8221;</p>
                <p>There was a unique key included in the individual hyperlinks sent out to participants to access the survey tool. The key was logged by the tool and exported with the data; therefore, duplicate entries from the same user were precluded. The tool was configured to continue only after a question was completed. A back button allowed for corrections.</p>
                <p>Data with personal information were stored in encrypted form when exported from the survey tool. Persons involved in the statistical evaluation were blinded and worked with anonymized data. A monitoring group was in charge of protecting the data and the interests of the participants. All students involved in the investigation were required to sign a confidentiality agreement.</p>
            </sec>
            <sec>
                <title>Statistical Analysis</title>
                <p>Scores were introduced to perform a statistical analysis of the data collected. A linear score from 0 (answer 1) to 3 (answer 4) was used, as shown in <xref ref-type="table" rid="table1">Table 1</xref>. The higher a hospital&#8217;s overall score, the more sophisticated its data security management.</p>
                <table-wrap id="table1" position="float">
                    <label>Table 1</label>
                    <caption>
                        <p>The four possible answers to questionnaire items and the assigned score points.</p>
                    </caption>
                    <table width="616" border="1" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
                        <col width="448" />
                        <col width="138" />
                        <thead>
                            <tr valign="top">
                                <td>Answer</td>
                                <td>Score points</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>1. Unknown, not implemented</td>
                                <td>0</td>
                            </tr>
                            <tr valign="top">
                                <td>2. Known, partially implemented</td>
                                <td>1</td>
                            </tr>
                            <tr valign="top">
                                <td>3. Completely implemented</td>
                                <td>2</td>
                            </tr>
                            <tr valign="top">
                                <td>4. Completely implemented, under continuous improvement</td>
                                <td>3</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Hospitals were classified into (1)&#160;academic (university) hospitals with a research mandate from the state, (2)&#160;non-academic public hospitals with an emergency ward, (3)&#160;rehabilitation clinics, and (4)&#160;private hospitals. Furthermore, the hospitals were split into two groups based on hospital size (ie, hospitals with&#160;&#62;&#160;150 beds and hospitals with&#160;&#8804;&#160;150 beds.</p>
                <p>For data reduction, a factor analysis with varimax rotation and Kaiser normalization using SPSS version 15 (SPSS Inc, Chicago, IL, USA) was applied to group-related questions into independent factors.The Kaiser normalization eliminated all components with eigenvalues under 1.0, thus extracting 7 reasonable factors. No further cutoff criteria for determining the optimal number of factors were explored.</p>
                <p>Since normal distribution could not be shown using a Shapiro-Wilk test, a two-way non-parametric analysis of variance (Friedman test) was performed for both the type of risk factors determined by the factor analysis and the group of hospitals. The difference between hospital types was then determined using pairwise testing with Bonferroni&#8217;s corrections. Subsequently, the influence of each of the 7 risk factors on the differentiation between hospital types was calculated using a non-parametric one-way analysis of variance (Kruskal-Wallis test). The effect of hospital size (number of beds) was determined using a Friedman test, also taking into account the 7 risk factors.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <sec>
                <title>Questionnaire</title>
                <p>Of the 112 CIOs invited to participate in the survey, 69 (61.6%) responded. Of these, 7 did not give informed consent, 9 aborted the questionnaire while answering the general questions about the hospital, and 2 aborted the questionnaire while answering the questions about information security. In <xref ref-type="table" rid="table2">Table 2</xref>, &#8220;responded,&#8221; &#8220;participated,&#8221; and &#8220;completed&#8221; indicate that the survey page was visited, that the informed consent page was filled out, and that the questionnaire was fully completed, respectively. Thus, there was a 90% (62/69) participation rate and a 74% (51/69) completion rate [<xref ref-type="bibr" rid="ref16">16</xref>]. Only the 51 completed datasets were used for further analysis.</p>
                <table-wrap id="table2" position="float">
                    <label>Table 2</label>
                    <caption>
                        <p>Analysis of the number and percentage of returned questionnaires with respect to hospital type and hospital size.</p>
                    </caption>
                    <table width="611" border="1" cellpadding="5" cellspacing="0" rules="groups" frame="hsides">
                        <col width="42" />
                        <col width="153" />
                        <col width="30" />
                        <col width="49" />
                        <col width="26" />
                        <col width="52" />
                        <col width="26" />
                        <col width="52" />
                        <col width="26" />
                        <col width="52" />
                        <thead>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Group</bold>
                                </td>
                                <td colspan="2">
                                    <bold>Invited</bold>
                                </td>
                                <td colspan="2">
                                    <bold>Responded</bold>
                                </td>
                                <td colspan="2">
                                    <bold>Participated</bold>
                                </td>
                                <td colspan="2">
                                    <bold>Completed</bold>
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>n</td>
                                <td>%</td>
                                <td>n</td>
                                <td>%</td>
                                <td>n</td>
                                <td>%</td>
                                <td>n</td>
                                <td>%</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Hospital type (total)</bold>
                                </td>
                                <td>112</td>
                                <td>100%</td>
                                <td>69</td>
                                <td>62%</td>
                                <td>62</td>
                                <td>90%</td>
                                <td>51</td>
                                <td>74%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>University hospital</td>
                                <td>11</td>
                                <td>100%</td>
                                <td>9</td>
                                <td>82%</td>
                                <td>6</td>
                                <td>67%</td>
                                <td>4</td>
                                <td>44%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Public hospital</td>
                                <td>54</td>
                                <td>100%</td>
                                <td>39</td>
                                <td>72%</td>
                                <td>36</td>
                                <td>92%</td>
                                <td>29</td>
                                <td>74%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Rehabilitation clinic</td>
                                <td>13</td>
                                <td>100%</td>
                                <td>7</td>
                                <td>54%</td>
                                <td>7</td>
                                <td>100%</td>
                                <td>6</td>
                                <td>86%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Private hospital</td>
                                <td>34</td>
                                <td>100%</td>
                                <td>14</td>
                                <td>41%</td>
                                <td>13</td>
                                <td>93%</td>
                                <td>12</td>
                                <td>86%</td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Hospital size (total)</bold>
                                </td>
                                <td>112</td>
                                <td>100%</td>
                                <td>69</td>
                                <td>62%</td>
                                <td>62</td>
                                <td>90%</td>
                                <td>51</td>
                                <td>74%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>&#8804; 150 beds</td>
                                <td>45</td>
                                <td>100%</td>
                                <td>20</td>
                                <td>44%</td>
                                <td>18</td>
                                <td>90%</td>
                                <td>16</td>
                                <td>80%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>&#62; 150 beds</td>
                                <td>67</td>
                                <td>100%</td>
                                <td>49</td>
                                <td>73%</td>
                                <td>44</td>
                                <td>90%</td>
                                <td>35</td>
                                <td>71%</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Of the 51 hospitals in which a CIO had completed the questionnaire, 4 were university hospitals, 29 were public hospitals, 6 were rehabilitation clinics, and 12 were private hospitals.The hospitals which completed the questionnaire had total scores ranging from 30.6% to 81.9% out of a maximum score of 100%. These scores are presented in <xref ref-type="table" rid="table3">Table 3</xref> for the two hospital sizes and for the four hospital types.</p>
                <p>To visualize the overall distribution of information security for hospitals in German-speaking Switzerland, each hospital&#8217;s individual score was calculated as a percentage of the maximum score. These percentages are shown in <xref ref-type="fig" rid="figure1">Figure 1</xref> as functions of the number of beds in a hospital. Additionally, a least squares regression curve was laid over the cumulated scores. The curve characterizes the distribution of information security per hospital bed. The 50% line shows that, according to the regression curve, 50% of all hospital beds reached a score of 49.2% or less of the maximum score.</p>
                <p>The factor analysis extracted 7 factors, explaining 70% of the total variance. The questions were assigned to the factor with the highest correlation (<xref ref-type="table" rid="table4">Table 4</xref>).</p>
                <p>The grouping of the questions into factors gave interesting insights into their relationship and made it possible to assign a group term to each of the 7 groups of questions (<xref ref-type="table" rid="table5">Table 5</xref>).</p>
                <table-wrap id="table3" position="float">
                    <label>Table 3</label>
                    <caption>
                        <p>Scores for each hospital type and for the different hospital sizes.</p>
                    </caption>
                    <table width="611" border="1" cellpadding="5" cellspacing="0" rules="groups" frame="hsides">
                        <col width="54" />
                        <col width="172" />
                        <col width="46" />
                        <col width="55" />
                        <col width="55" />
                        <col width="47" />
                        <col width="55" />
                        <col width="46" />
                        <thead>
                            <tr valign="top">
                                <td colspan="2">Group</td>
                                <td colspan="2">Average score</td>
                                <td colspan="2">Minimum score</td>
                                <td colspan="2">Maximum score</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>Mean</td>
                                <td>%</td>
                                <td>Mean</td>
                                <td>%</td>
                                <td>Mean</td>
                                <td>%</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Hospital type (total)</bold>
                                </td>
                                <td>36.8</td>
                                <td>51.1%</td>
                                <td>22</td>
                                <td>30.6%</td>
                                <td>59</td>
                                <td>81.9%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>University hospital</td>
                                <td>32.8</td>
                                <td>45.5%</td>
                                <td>24</td>
                                <td>33.3%</td>
                                <td>40</td>
                                <td>55.6%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Public hospital</td>
                                <td>36.4</td>
                                <td>50.6%</td>
                                <td>22</td>
                                <td>30.6%</td>
                                <td>59</td>
                                <td>81.9%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Rehabilitation clinic</td>
                                <td>35.2</td>
                                <td>48.8%</td>
                                <td>23</td>
                                <td>31.9%</td>
                                <td>56</td>
                                <td>77.8%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>Private hospital</td>
                                <td>39.9</td>
                                <td>55.4%</td>
                                <td>30</td>
                                <td>41.7%</td>
                                <td>53</td>
                                <td>73.6%</td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Hospital size (total)</bold>
                                </td>
                                <td>36.8</td>
                                <td>51.1%</td>
                                <td>22</td>
                                <td>30.6%</td>
                                <td>59</td>
                                <td>81.9%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>&#8804; 150 beds</td>
                                <td>36.8</td>
                                <td>51.1%</td>
                                <td>22</td>
                                <td>30.6%</td>
                                <td>58</td>
                                <td>80.6%</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>&#62; 150 beds</td>
                                <td>36.8</td>
                                <td>51.2%</td>
                                <td>23</td>
                                <td>31.9%</td>
                                <td>59</td>
                                <td>81.9%</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <table-wrap id="table4" position="float">
                    <label>Table 4</label>
                    <caption>
                        <p>Results of the factor analysis (rotated component matrix).</p>
                    </caption>
                    <table width="608" border="1" cellpadding="5" cellspacing="0" rules="groups" frame="hsides">
                        <col width="56" />
                        <col width="176" />
                        <col width="38" />
                        <col width="38" />
                        <col width="44" />
                        <col width="44" />
                        <col width="44" />
                        <col width="38" />
                        <col width="38" />
                        <tbody>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>1. Process and quality management</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>5. Classification of information</td>
                                <td>0.79<sup>a</sup>
                                </td>
                                <td>&#8211;0.08</td>
                                <td>0.19</td>
                                <td>&#8211;0.07</td>
                                <td>&#8211;0.05</td>
                                <td>0.01</td>
                                <td>0.27</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>7. Awareness and end-user training</td>
                                <td>0.45<sup>a</sup>
                                </td>
                                <td>0.22</td>
                                <td>0.25</td>
                                <td>0.25</td>
                                <td>0.21</td>
                                <td>0.27</td>
                                <td>&#8211;0.11</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>9. Documented business processes</td>
                                <td>0.57<sup>a</sup>
                                </td>
                                <td>&#8211;0.06</td>
                                <td>&#8211;0.01</td>
                                <td>0.36</td>
                                <td>&#8211;0.11</td>
                                <td>0.11</td>
                                <td>0.13</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>21. Security incidents reporting</td>
                                <td>0.70<sup>a</sup>
                                </td>
                                <td>0.30</td>
                                <td>0.19</td>
                                <td>0.01</td>
                                <td>0.11</td>
                                <td>0.09</td>
                                <td>&#8211;0.08</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>22. Learning from incidents</td>
                                <td>0.81<sup>a</sup>
                                </td>
                                <td>0.23</td>
                                <td>0.05</td>
                                <td>0.26</td>
                                <td>0.15</td>
                                <td>0.13</td>
                                <td>&#8211;0.11</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>23. Ensuring hospital business continuity</td>
                                <td>0.69<sup>a</sup>
                                </td>
                                <td>0.10</td>
                                <td>0.21</td>
                                <td>&#8211;0.23</td>
                                <td>0.12</td>
                                <td>&#8211;0.09</td>
                                <td>0.42</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>2. Access control and procurement</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>13. Policies for handling mobile storage devices</td>
                                <td>0.02</td>
                                <td>0.54<sup>a</sup>
                                </td>
                                <td>0.14</td>
                                <td>0.18</td>
                                <td>0.14</td>
                                <td>0.43</td>
                                <td>&#8211;0.01</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>15. User management and access rights</td>
                                <td>0.13</td>
                                <td>0.77<sup>a</sup>
                                </td>
                                <td>0.06</td>
                                <td>0.10</td>
                                <td>&#8211;0.10</td>
                                <td>0.20</td>
                                <td>0.17</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>16. Remote access control</td>
                                <td>&#8211;0.02</td>
                                <td>0.82<sup>a</sup>
                                </td>
                                <td>0.17</td>
                                <td>&#8211;0.16</td>
                                <td>0.30</td>
                                <td>0.09</td>
                                <td>&#8211;0.03</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>18. Secure procurement</td>
                                <td>0.28</td>
                                <td>0.69<sup>a</sup>
                                </td>
                                <td>0.02</td>
                                <td>0.27</td>
                                <td>0.21</td>
                                <td>&#8211;0.01</td>
                                <td>0.19</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>3. Organization and risk management</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>1. Security-risk analysis</td>
                                <td>0.38</td>
                                <td>0.07</td>
                                <td>0.58<sup>a</sup>
                                </td>
                                <td>&#8211;0.24</td>
                                <td>&#8211;0.09</td>
                                <td>0.00</td>
                                <td>0.03</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>2. Information-security policies</td>
                                <td>0.09</td>
                                <td>0.08</td>
                                <td>0.72<sup>a</sup>
                                </td>
                                <td>0.42</td>
                                <td>0.21</td>
                                <td>0.10</td>
                                <td>0.01</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>3. Management commitment</td>
                                <td>0.10</td>
                                <td>0.09</td>
                                <td>0.88<sup>a</sup>
                                </td>
                                <td>0.08</td>
                                <td>0.01</td>
                                <td>0.21</td>
                                <td>0.00</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>4. IT inventory and data ownership</td>
                                <td>0.38</td>
                                <td>0.17</td>
                                <td>0.50<sup>a</sup>
                                </td>
                                <td>0.47</td>
                                <td>&#8211;0.31</td>
                                <td>&#8211;0.06</td>
                                <td>&#8211;0.08</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>4. Control and monitoring</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>6. Employment-contract rules</td>
                                <td>0.22</td>
                                <td>0.07</td>
                                <td>0.07</td>
                                <td>0.61<sup>a</sup>
                                </td>
                                <td>0.02</td>
                                <td>0.49</td>
                                <td>&#8211;0.13</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>14. Monitoring</td>
                                <td>&#8211;0.10</td>
                                <td>0.13</td>
                                <td>0.14</td>
                                <td>0.74<sup>a</sup>
                                </td>
                                <td>0.22</td>
                                <td>&#8211;0.05</td>
                                <td>0.26</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>17. System-login security</td>
                                <td>0.34</td>
                                <td>0.44</td>
                                <td>&#8211;0.13</td>
                                <td>0.46<sup>a</sup>
                                </td>
                                <td>0.05</td>
                                <td>0.12</td>
                                <td>0.36</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>5. Attack protection</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>11. Malware protection</td>
                                <td>0.35</td>
                                <td>0.36</td>
                                <td>&#8211;0.30</td>
                                <td>0.16</td>
                                <td>0.56<sup>a</sup>
                                </td>
                                <td>0.07</td>
                                <td>&#8211;0.09</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>20. Patch management</td>
                                <td>&#8211;0.30</td>
                                <td>0.20</td>
                                <td>&#8211;0.09</td>
                                <td>0.15</td>
                                <td>0.64<sup>a</sup>
                                </td>
                                <td>0.25</td>
                                <td>0.17</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>24. Security assessments</td>
                                <td>0.30</td>
                                <td>0.06</td>
                                <td>0.40</td>
                                <td>&#8211;0.04</td>
                                <td>0.65<sup>a</sup>
                                </td>
                                <td>0.05</td>
                                <td>&#8211;0.09</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>6. Encryption and staging</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>10. Staging (separation of development, test, and productive environment)</td>
                                <td>0.42</td>
                                <td>0.27</td>
                                <td>0.13</td>
                                <td>0.04</td>
                                <td>0.17</td>
                                <td>0.57<sup>a</sup>
                                </td>
                                <td>&#8211;0.14</td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>19. Encryption of mobile data</td>
                                <td>&#8211;0.02</td>
                                <td>0.15</td>
                                <td>0.11</td>
                                <td>&#8211;0.01</td>
                                <td>0.11</td>
                                <td>0.84<sup>a</sup>
                                </td>
                                <td>0.18</td>
                            </tr>
                        </tbody>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>7. Backup and security zones</bold>
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                                <td>
                                    <break />
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>8. Security zones</td>
                                <td>0.34</td>
                                <td>0.22</td>
                                <td>0.10</td>
                                <td>0.20</td>
                                <td>0.47</td>
                                <td>0.29</td>
                                <td>0.50<sup>a</sup>
                                </td>
                            </tr>
                            <tr valign="top">
                                <td>
                                    <break />
                                </td>
                                <td>12. Backup</td>
                                <td>0.06</td>
                                <td>0.12</td>
                                <td>&#8211;0.04</td>
                                <td>0.12</td>
                                <td>&#8211;0.02</td>
                                <td>0.03</td>
                                <td>0.86<sup>a</sup>
                                </td>
                            </tr>
                        </tbody>
                    </table>
                    <table-wrap-foot>
                        <fn id="table4fn1">
                            <p>
                                <sup>a</sup>highest correlation value per question.</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <table-wrap id="table5" position="float">
                    <label>Table 5</label>
                    <caption>
                        <p>Terms given to the seven factor groups of questions.</p>
                    </caption>
                    <table width="612" border="1" cellpadding="5" cellspacing="0" rules="groups" frame="hsides">
                        <col width="169" />
                        <col width="422" />
                        <thead>
                            <tr valign="top">
                                <td>Factor</td>
                                <td>Term</td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>Factor 1</td>
                                <td>Process and quality management</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 2</td>
                                <td>Access control and procurement</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 3</td>
                                <td>Organization and risk management</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 4</td>
                                <td>Control and monitoring</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 5</td>
                                <td>Attack protection</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 6</td>
                                <td>Encryption and staging</td>
                            </tr>
                            <tr valign="top">
                                <td>Factor 7</td>
                                <td>Backup and security zones</td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>The null hypothesis that all hospital types reach the same scores could be rejected (<italic>P</italic>&#160;&#60;&#160;.05) on the basis of the Friedman test for all 28 groups (7 risk-factor groups and 4 types of hospitals). With the Kruskal-Wallis test, a significant difference (<italic>P</italic>&#160;&#60;&#160;.05) in factor 7 (backup and security zones) between hospital types was found, with university hospitals ranking lowest and private hospitals highest (<xref ref-type="fig" rid="figure2">Figure 2</xref>). Using (conservative) pairwise testing and Bonferroni&#8217;s correction, however, no significant difference was found (<italic>P</italic>&#160;=&#160;.02 which is greater than .05/7&#160;=&#160;.0071). No significant effect was observed with respect to hospital size (<xref ref-type="fig" rid="figure3">Figure 3</xref>).</p>
                <fig id="figure1" position="float">
                    <label>Figure 1</label>
                    <caption>
                        <p>Cumulated scores by hospital beds.</p>
                    </caption>
                    <graphic xlink:href="ijmr_v1i2e11_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure2" position="float">
                    <label>Figure 2</label>
                    <caption>
                        <p>Scores by hospital groups.</p>
                    </caption>
                    <graphic xlink:href="ijmr_v1i2e11_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure3" position="float">
                    <label>Figure 3</label>
                    <caption>
                        <p>Scores by hospital size.</p>
                    </caption>
                    <graphic xlink:href="ijmr_v1i2e11_fig3.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <sec>
                <title>Main Results</title>
                <p>In this investigation, a comprehensive, but efficient and rapid, method to survey information security in institutions was introduced and successfully applied in 51 Swiss hospitals. Half (50.00%, 8588/17,177) of all hospital beds had a score of less than 49.2% of the maximum possible score (100%). In other words, a patient in one of these hospitals runs a 50% risk that he or she will lie in a hospital bed for which information security scores only reach 49%. Furthermore, university hospitals had lower scores for basic security features than private hospitals, although this difference does not reach statistical significance when conservative testing procedures are applied.</p>
            </sec>
            <sec>
                <title>Methods</title>
                <p>The lack of tools to quickly and inexpensively assess the information security of large numbers of hospitals led us to develop an effective and comprehensive survey tool. Only the 24 most-pertinent parameters of the total 133 parameters in the ISO/IEC 27002 standard were included to keep the resulting questionnaire manageable in a reasonable amount of time and to restrict the amount of data generated. This was possible by combining several subchapters into one parameter and selecting questions especially relevant to hospitals.</p>
                <p>Tools, such as the one presented here, will become increasingly important as more and more countries need to address issues of information security in their health care systems.</p>
            </sec>
            <sec>
                <title>Questionnaire</title>
                <p>Only the data of hospitals that fully completed the questionnaire were analyzed. However, a selection bias may have influenced participation: Hospitals envisaging a potential for improvement in their security management may have been more willing to fill out the questionnaire to receive free advice through our benchmark report. On the other hand, hospitals apprehensive of a bad ranking might have refrained from answering. Unfortunately, this bias cannot be verified retrospectively.</p>
                <p>Only 44% (20/45) of the smaller hospitals responded to the survey, compared to 73% (49/67) of the larger hospitals (<xref ref-type="table" rid="table2">Table 2</xref>). It is possible that smaller hospitals have fewer IT resources and, therefore, did not take the time to fill out our questionnaire. However, it should be noted that larger hospitals aborted the questionnaire more frequently. Fewer university hospitals completed the questionnaire than other hospitals (<xref ref-type="table" rid="table2">Table 2</xref>). The number of invited university hospitals may appear misleadingly high, as the German-speaking part of Switzerland only has three university hospitals. However, several university hospitals have subunits (eg, children&#8217;s hospitals) with completely or partially independent IT structures. Fortunately, for each university hospital, exactly one eligible person representing the entire institution filled in the questionnaire. It is likely that these institutions appointed someone to respond, which also explains the frequency of aborted questionnaires.</p>
                <p>Whether the responders filled out the questionnaire truthfully, whether they portrayed information security as more sophisticated than it actually is, or whether some respondents even understated their hospital&#8217;s performance to be able to apply for more funds for their department remains unclear. These questions can only be explored with an on-site investigation.</p>
            </sec>
            <sec>
                <title>Data Processing</title>
                <p>Meaningful groups of security items were formed using factor analysis. The items of the first 5 factors dealt with similar topics. The final 2 factors, however, mixed different topics. This led to a decrease of eigenvalues and of the explanatory power of higher factor numbers as a consequence because of the very nature of factor analysis. Although all items in factor 6 (encryption and staging) showed an unambiguous high correlation with their factor, the mapping of question 8 about &#8220;security zones&#8221; to factor 7 (backup and security zones) was less straightforward because this question also showed high correlation with factor 5 (attack protection) to which it might also have been attributed based on its content. However, the authors decided to base factor attribution on the highest correlation and accepted the automated mapping suggested by the factor analysis.</p>
            </sec>
            <sec>
                <title>Limitations</title>
                <p>Switzerland is a small country with four different linguistic regions. Because only hospitals in the German-speaking part of Switzerland were included, the number of hospitals surveyed was relatively low. It would be interesting to perform the study in a larger, more uniform country to be able to work with larger numbers.</p>
            </sec>
            <sec>
                <title>Risks for Patients</title>
                <p>Of the 133 controls in the ISO/IEC 27002, <italic>Information technology &#8211; Security techniques &#8211; Code of practice for information-security management</italic>, the 24 that referred to issues of basic security were selected for our questionnaire.</p>
                <p>Secure information processing in hospitals, such as preventing the loss or the (conscious or unintentional) manipulation of data, is crucial for patients&#8217; health. Moreover, patient health data is protected by law in Switzerland: All patient data must be stored, transmitted, and processed in a secure way that ensures confidentiality and integrity. Our results showed that only 50% of the hospital beds reach 50% of the maximum security score, implying a substantial need for improvement in many of the controls surveyed.</p>
            </sec>
            <sec>
                <title>Recommendations for Hospitals</title>
                <p>To address the most evident risks found in Swiss hospitals, we recommend considering the following points. We limit ourselves to the 8 questions with the lowest scores (see <xref ref-type="app" rid="app1">Appendix 1</xref> for questions and for the reference to the ISO/IEC 27002 section [<xref ref-type="bibr" rid="ref9">9</xref>]):</p>
                <list list-type="order">
                    <list-item>
                        <p>Risk assessments should be conducted regularly to identify, quantify, and prioritize risks (Question 1). The results should guide and determine the appropriate management action and help to prioritize controls to protect against these risks.</p>
                    </list-item>
                    <list-item>
                        <p>Information-security policies, standards, and guidelines should be created, approved by management, published, and communicated to all employees and relevant external parties (Question 2). These documents define how security is managed within the hospital. They should be regularly reviewed to ensure their suitability, adequacy, and effectiveness.</p>
                    </list-item>
                    <list-item>
                        <p>Management should actively support security within the hospital (Question 3). Administrative management and medical management should support security through clear direction, demonstrated commitment, explicit assignment, and acknowledgment of information-security responsibilities. The support of the management is one of the most important pillars of a strong information-security culture.</p>
                    </list-item>
                    <list-item>
                        <p>Information classification should be implemented in the hospitals (Question 5). Information has different values and may be subject to different regulations. Knowing the value, sensitivity, and importance of hospital data allows for prioritizing the protection measures.</p>
                    </list-item>
                    <list-item>
                        <p>A policy on the use of cryptographic controls should be developed (Question 19). Today an increasing number of internal and external systems exchange data with each other over the Internet. These data are subject to data protection law and have to be protected. Cryptographic controls allow a secure data exchange and guarantees the integrity and authenticity of the hospital data.</p>
                    </list-item>
                    <list-item>
                        <p>Responsibilities and procedures should be established to handle information-security incidents effectively once they have been reported (Question 22). A process of continual improvement should be applied to learn from such events.</p>
                    </list-item>
                    <list-item>
                        <p>A business continuity plan should be developed and maintained for business continuity throughout the hospital (Question 23). Business continuity protects critical business processes from the effects of major failures of information systems or disasters. It is especially important for the critical infrastructure of hospitals.</p>
                    </list-item>
                    <list-item>
                        <p>The security of the hospital information systems should be reviewed regularly (Question 24). Different approaches exist to review the compliance of information processing with policies and standards, such as baseline audits, penetration tests, or vulnerability scans. Such reviews will reveal weaknesses and allow for prioritizing the protection measures.</p>
                    </list-item>
                </list>
                <p>Implementing these measures will close the most important information security gaps in Swiss hospitals. They also lay the foundation for further security optimizations.</p>
            </sec>
            <sec>
                <title>Conclusions</title>
                <p>In this paper, a comprehensive and efficient survey tool to obtain meaningful data concerning information security was introduced. Applied to assess information security in hospitals within the German-speaking section of Switzerland, it revealed surprisingly low security scores, especially for basic security issues. These results raise serious questions as to whether Swiss hospitals meet their patients&#8217; expectations and the country&#8217;s legal requirements with regard to the level of information security they can guarantee. Our survey identified an urgent need for action to improve information security in hospitals, independent of their size and type.</p>
                <p>In the future, the need for secure information handling in hospitals will increase greatly because of increased IT usage and digitalization in the health care sector. Information must also be protected from cyber threats that are increasing in number and sophistication. In the future, we will see more cyber threats that will directly attack industrial plants or a country&#8217;s or region&#8217;s critical infrastructures [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. Hospitals are part of this critical infrastructure of a country; therefore, they must be protected from such information security breaches.</p>
            </sec>
        </sec>
    </body>
    <back>
        <app-group>
            <app id="app1">
                <title>Multimedia Appendix 1</title>
                <p>Questions assessed in the online survey.</p>
                <media xlink:href="ijmr_v1i2e11_app1.pdf" xlink:title="PDF File (Adobe PDF File), 34KB" />
            </app>
        </app-group>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">CIO</term>
                    <def>
                        <p>chief information officer</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">FTE</term>
                    <def>
                        <p>full-time equivalents</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">IEC</term>
                    <def>
                        <p>International Electrotechnical Commission</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">ISO</term>
                    <def>
                        <p>International Organization for Standardization</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">ISO/IEC 27002 standard</term>
                    <def>
                        <p>Information technology &#8211; Security techniques &#8211; Code of practice for information security management</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ack>
            <p>The authors would like to thank the students of the 2010/2011 &#8220;Research and Project Management&#8221; class at the Berne University of Applied Science who conducted this study as part of a class project: Amonn Christian, Bernegau Hans-Georg, Bl&#252;chel Tobias, Bolzern Silvio, Bozkurt Deniz, Brunner Heinz-Ren&#233;, Brunner Manuel, Fehlmann Daniel, Graf Schl&#228;ppi Franziska, Herren Lukas, Hjortsberg Linn, H&#252;gle Markus, Iseli Martin, Jeitziner Marie-Madlen, Kaltenrieder J&#252;rg, Kaufmann Reto, Maurer Corinne, M&#252;hlenbein Markus, Napoletano Daniel, Nilsen-Luginb&#252;hl Marianne, Nyfeler Franziska, Pulver Lilly, Sch&#228;rer Benjamin, Schweizer Stefan, Siegenthaler Christoph, Sigg Stephan, Weber J&#252;rg, and Zettler Sybille.</p>
            <p> We would also like to thank Marc Matter who helped with the scientific writing.</p>
        </ack>
        <fn-group>
            <fn fn-type="conflict">
                <p>None declared.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dinh</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chu</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Evolution of health information management and information technology in emergency medicine</article-title>
                    <source>Emerg Med Australas</source>
                    <year>2006</year>
                    <month>06</month>
                    <volume>18</volume>
                    <issue>3</issue>
                    <fpage>289</fpage>
                    <lpage>94</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1742-6723.2006.00855.x</pub-id>
                    <pub-id pub-id-type="medline">16712540</pub-id>
                    <pub-id pub-id-type="pii">EMM</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Einbinder</surname>
                            <given-names>JS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>Leveraging information technology to improve quality and safety</article-title>
                    <source>Yearb Med Inform</source>
                    <year>2007</year>
                    <fpage>22</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="medline">17700900</pub-id>
                    <pub-id pub-id-type="pii">me07010022</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Katsikas</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lopez</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pernul</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>The challenge for security and privacy services in distributed health settings</article-title>
                    <source>Stud Health Technol Inform</source>
                    <year>2008</year>
                    <volume>134</volume>
                    <fpage>113</fpage>
                    <lpage>25</lpage>
                    <pub-id pub-id-type="medline">18376039</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Calberson</surname>
                            <given-names>FL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hommez</surname>
                            <given-names>GM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>De Moor</surname>
                            <given-names>RJ</given-names>
                        </name>
                    </person-group>
                    <article-title>Fraudulent use of digital radiography: methods to detect and protect digital radiographs</article-title>
                    <source>J Endod</source>
                    <year>2008</year>
                    <month>05</month>
                    <volume>34</volume>
                    <issue>5</issue>
                    <fpage>530</fpage>
                    <lpage>6</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.joen.2008.01.019</pub-id>
                    <pub-id pub-id-type="medline">18436029</pub-id>
                    <pub-id pub-id-type="pii">S0099-2399(08)00088-5</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lovis</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Spahni</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cassoni</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Geissbuhler</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Comprehensive management of the access to the electronic patient record: towards trans-institutional networks</article-title>
                    <source>Int J Med Inform</source>
                    <year>2007</year>
                    <month>06</month>
                    <volume>76</volume>
                    <issue>5-6</issue>
                    <fpage>466</fpage>
                    <lpage>70</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2006.09.014</pub-id>
                    <pub-id pub-id-type="medline">17084663</pub-id>
                    <pub-id pub-id-type="pii">S1386-5056(06)00219-X</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Joshi</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Finin</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kagal</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Parker</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Patwardhan</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Security policies and trust in ubiquitous computing</article-title>
                    <source>Philos Transact A Math Phys Eng Sci</source>
                    <year>2008</year>
                    <month>10</month>
                    <day>28</day>
                    <volume>366</volume>
                    <issue>1881</issue>
                    <fpage>3769</fpage>
                    <lpage>80</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://rsta.royalsocietypublishing.org/cgi/pmidlookup?view=long&#38;pmid=18672450" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1098/rsta.2008.0142</pub-id>
                    <pub-id pub-id-type="medline">18672450</pub-id>
                    <pub-id pub-id-type="pii">648Q88T6RL417167</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <collab>International Organization for Standardization/International Electrotechnical Commission</collab>
                    </person-group>
                    <source>ISO/IEC 27000:2009 Information technology -- Security techniques -- Code of practice for information security management</source>
                    <year>2009</year>
                    <publisher-loc>Geneva</publisher-loc>
                    <publisher-name>International Organization for Standardization</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gomes</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lap&#227;o</surname>
                            <given-names>LV</given-names>
                        </name>
                    </person-group>
                    <article-title>The adoption of IT security standards in a healthcare environment</article-title>
                    <source>Stud Health Technol Inform</source>
                    <year>2008</year>
                    <volume>136</volume>
                    <fpage>765</fpage>
                    <lpage>70</lpage>
                    <pub-id pub-id-type="medline">18487824</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <collab>International Organization for Standardization/International Electrotechnical Commission</collab>
                    </person-group>
                    <source>ISO/IEC 27002:2008 Information technology - Security techniques - Code of practice for information security management</source>
                    <year>2008</year>
                    <publisher-loc>Geneva</publisher-loc>
                    <publisher-name>International Organization of Standardization</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Glaser</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Aske</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Healthcare IT trends raise bar for information security</article-title>
                    <source>Healthc Financ Manage</source>
                    <year>2010</year>
                    <month>07</month>
                    <volume>64</volume>
                    <issue>7</issue>
                    <fpage>40</fpage>
                    <lpage>4</lpage>
                    <pub-id pub-id-type="medline">20608415</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>SerNet GmbH</collab>
                    </person-group>
                    <source>verinice</source>
                    <access-date>2011-10-17</access-date>
                    <comment>2011<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.verinice.org/en/">http://www.verinice.org/en/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">62VaOxG6a</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Bundesamt f&#252;r Gesundheit (BAG)</collab>
                    </person-group>
                    <source>Strategie &#8222;eHealth&#8221; Schweiz</source>
                    <year>2007</year>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.e-health-suisse.ch/index.html?lang=de&#38;download=NHzLpZeg7t,lnp6I0NTU042l2Z6ln1acy4Zn4Z2qZpnO2Yuq2Z6gpJCDdHt5f2ym162epYbg2c_JjKbNoKSn6A--">http://www.e-health-suisse.ch/index.html?lang=de&#38;download=NHzLpZeg7t,lnp6I0NTU042l2Z6ln1acy4Zn4Z2qZpnO2Yuq2Z6gpJCDdHt5f2ym162epYbg2c_JjKbNoKSn6A--</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">62Vayvxib</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Globalpark</surname>
                            <given-names>AG</given-names>
                        </name>
                    </person-group>
                    <source>Online surveys software for Universities</source>
                    <year>2011</year>
                    <access-date>2011-10-17</access-date>
                    <comment>Online surveys software for Universities<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.unipark.com/1-1-unipark-homepage.htm">http://www.unipark.com/1-1-unipark-homepage.htm</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">62VbO7QlH</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cook</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Heath</surname>
                            <given-names>F</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thompson</surname>
                            <given-names>RL</given-names>
                        </name>
                    </person-group>
                    <article-title>A meta-analysis of response rates in Web- or Internet-based surveys</article-title>
                    <source>Educational and Psychological Measurement</source>
                    <year>2000</year>
                    <month>12</month>
                    <volume>60</volume>
                    <fpage>821</fpage>
                    <lpage>836</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>National Geographic Society</collab>
                    </person-group>
                    <source>The Genographic Project</source>
                    <access-date>2011-10-17</access-date>
                    <comment>2011<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://genographic.nationalgeographic.com/genographic/index.html">https://genographic.nationalgeographic.com/genographic/index.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">62VbkBIrp</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Eysenbach</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Improving the quality of Web surveys: the Checklist for Reporting Results of Internet E-Surveys (CHERRIES)</article-title>
                    <source>J Med Internet Res</source>
                    <year>2004</year>
                    <month>09</month>
                    <day>29</day>
                    <volume>6</volume>
                    <issue>3</issue>
                    <fpage>e34</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2004/3/e34/,doi:" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.6.3.e34</pub-id>
                    <pub-id pub-id-type="medline">15471760</pub-id>
                    <pub-id pub-id-type="pii">v6e34</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1550605</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chen</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Abu-Nimeh</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Lessons from Stuxnet</article-title>
                    <source>Computer</source>
                    <year>2011</year>
                    <volume>44</volume>
                    <issue>no. 4</issue>
                    <fpage>91</fpage>
                    <lpage>93</lpage>
                    <pub-id pub-id-type="doi">10.1109/MC.2011.115</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Michael</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Voas</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Laplante</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>Cyberpandemics: History, Inevitability, Response</article-title>
                    <source>IEEE Security and Privacy,</source>
                    <year>2009</year>
                    <volume>7</volume>
                    <issue>1</issue>
                    <fpage>63</fpage>
                    <lpage>67</lpage>
                    <pub-id pub-id-type="doi">10.1109/MSP.2009.4</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>