Difference between revisions of "Healthcare Data Security"

From MIT Technology Roadmapping
Jump to navigation Jump to search
Line 7: Line 7:
=== Roadmap Model Using OPM ===
=== Roadmap Model Using OPM ===
=== Figures of Merit ===
=== Figures of Merit ===
[[File:Telehealth Technology Overview shadow.png|thumb|Healthcare Data Security Architecture]]

Revision as of 08:49, 1 October 2020

Healthcare Data Security Technology Roadmap

  • 2HDS Healthcare Data Security

Roadmap Overview

The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.

Design Structure Matrix Allocation

Roadmap Model Using OPM

Figures of Merit

Healthcare Data Security Architecture