An analysis of the security of eHealth services of Dutch General Practitioners

In the Netherlands General Practitioners (GPs) make use of websites to provide eHealth services for requesting repeat prescriptions and for signing up over the internet. For this thesis the websites of 368 Dutch GPs have been examined for the presence of these services and the TLS configurations of the webservers hosting these services was measured against Dutch security guidelines of the Dutch Cyber Security Centre. The results of the online scan provided insight to what extent GPs make use of application service providers (ASPs) for these eHealth services and how the TLS confurations were configured by ASPs and other hosters. Based on a theoretical model on the conceptualisation of cyberspace, this thesis seeks for the answer how complicancy with these guidelines can be improved amoung Dutch GPs.

 

Keywords: GPs, TLS, Webforms Netherlands, eHealth

 

READ PDF>

 

 

 

 

  • A de minimis rule for personal data breach notifications...
    Master CS/Machiel Bolhuis
    >
  • A de minimis rule fo...
    Master CS/Machiel Bolhuis
    >
  • A de minimis rule for personal data breach notifications...
    Master CS/Machiel Bolhuis
    >
  • A generic approach for detecting security anomalies in I...
    Master CS/Jaap Mooij
    >
  • A generic approach f...
    Master CS/Jaap Mooij
    >
  • A generic approach for detecting security anomalies in I...
    Master CS/Jaap Mooij
    >
  • A Process Model for Phishing Prevention
    Master CS/Paulo Ribeiro do Nascimento
    >
  • A Process Model for...
    Master CS/Paulo Ribeiro do Nascimento
    >
  • A Process Model for Phishing Prevention
    Master CS/Paulo Ribeiro do Nascimento
    >
  • An improved key distribution and updating mechanism for...
    Master CS/Marcel van Leent
    >
  • An improved key dist...
    Master CS/Marcel van Leent
    >
  • An improved key distribution and updating mechanism for...
    Master CS/Marcel van Leent
    >
  • Caring for Security
    Master CS/David Willems
    >
  • Caring for Security
    Master CS/David Willems
    >
  • Caring for Security
    Master CS/David Willems
    >
  • Cyber Confidence-Building Measures
    Master CS/Kraesten Arnold
    >
  • Cyber Confidence-Bui...
    Master CS/Kraesten Arnold
    >
  • Cyber Confidence-Building Measures
    Master CS/Kraesten Arnold
    >
  • Cyber Threat Intelligence
    Master CS/Daan Planqué
    >
  • Cyber Threat Intelli...
    Master CS/Daan Planqué
    >
  • Cyber Threat Intelligence
    Master CS/Daan Planqué
    >
  • Essence of Encryption
    Master CS/Jeroen Veen
    >
  • Essence of Encryptio...
    Master CS/Jeroen Veen
    >
  • Essence of Encryption
    Master CS/Jeroen Veen
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Master CS/Ewout Pronk
    >
  • Guaranteeing authent...
    Master CS/Ewout Pronk
    >
  • Guaranteeing authenticity and integrity in signalling ex...
    Master CS/Ewout Pronk
    >
  • How to bring HTTPS to the masses?
    Master CS/Maarten Aertsen
    >
  • How to bring HTTPS t...
    Master CS/Maarten Aertsen
    >
  • How to bring HTTPS to the masses?
    Master CS/Maarten Aertsen
    >
  • Multi actor roadmap to improve cyber security of consume...
    Master CS/Herbert Leenstra
    >
  • Multi actor roadmap...
    Master CS/Herbert Leenstra
    >
  • Multi actor roadmap to improve cyber security of consume...
    Master CS/Herbert Leenstra
    >
  • Payment Services Directive 2
    Master CS/Stephan Hellmann
    >
  • Payment Services Dir...
    Master CS/Stephan Hellmann
    >
  • Payment Services Directive 2
    Master CS/Stephan Hellmann
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Master CS/Nelly Ghaoui
    >
  • Policy strategies fo...
    Master CS/Nelly Ghaoui
    >
  • Policy strategies for VPN for consumers in the Netherlan...
    Master CS/Nelly Ghaoui
    >
  • SDN South-bound Interface Attack Mitigation
    Master CS/Lucio Jankok
    >
  • SDN South-bound Inte...
    Master CS/Lucio Jankok
    >
  • SDN South-bound Interface Attack Mitigation
    Master CS/Lucio Jankok
    >
  • Targeted attacks and the human vulnerability
    Master CS/Derk-Jan van Mourik
    >
  • Targeted attacks and...
    Master CS/Derk-Jan van Mourik
    >
  • Targeted attacks and the human vulnerability
    Master CS/Derk-Jan van Mourik
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Master CS/Carlo Koch
    >
  • The implementation o...
    Master CS/Carlo Koch
    >
  • The implementation of the Dutch Cabinet’s policy on data...
    Master CS/Carlo Koch
    >
  • The influence of Dark Web on border control
    Master CS/Edwin Noordzij
    >
  • The influence of Dar...
    Master CS/Edwin Noordzij
    >
  • The influence of Dark Web on border control
    Master CS/Edwin Noordzij
    >

This website uses cookies to ensure you get the best experience on our website. By continuing to browse the site, you are agreeing to our use of cookies.. More info

 

I AGREE