Literature DB >> 32239357

Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.

Soumitra Sudip Bhuyan1, Umar Y Kabir2, Jessica M Escareno2, Kenya Ector2, Sandeep Palakodeti3, David Wyant4, Sajeesh Kumar5, Marian Levy2, Satish Kedia2, Dipankar Dasgupta6, Aram Dobalian2.   

Abstract

The recent rise in cybersecurity breaches in healthcare organizations has put patients' privacy at a higher risk of being exposed. Despite this threat and the additional danger posed by such incidents to patients' safety, as well as operational and financial threats to healthcare organizations, very few studies have systematically examined the cybersecurity threats in healthcare. To lay a firm foundation for healthcare organizations and policymakers in better understanding the complexity of the issue of cybersecurity, this study explores the major type of cybersecurity threats for healthcare organizations and explains the roles of the four major players (cyber attackers, cyber defenders, developers, and end-users) in cybersecurity. Finally, the paper discusses a set of recommendations for the policymakers and healthcare organizations to strengthen cybersecurity in their organization.

Entities:  

Keywords:  Blockchain; Cyber security; Cyberattack; Cybersecurity; Data breach; Patient data; Privacy; Security

Mesh:

Year:  2020        PMID: 32239357     DOI: 10.1007/s10916-019-1507-y

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  10 in total

1.  The right mind-set for managing information technology.

Authors:  M Bensaou; M Earl
Journal:  Harv Bus Rev       Date:  1998 Sep-Oct

2.  Too Much or Too Little? How Much Control Should Patients Have Over EHR Data?

Authors:  Soumitra Sudip Bhuyan; Sandra Bailey-DeLeeuw; David K Wyant; Cyril F Chang
Journal:  J Med Syst       Date:  2016-06-06       Impact factor: 4.460

3.  Cyber-Security Issues in Healthcare Information Technology.

Authors:  Steve G Langer
Journal:  J Digit Imaging       Date:  2017-02       Impact factor: 4.056

4.  WannaCry, Cybersecurity and Health Information Technology: A Time to Act.

Authors:  Jesse M Ehrenfeld
Journal:  J Med Syst       Date:  2017-07       Impact factor: 4.460

5.  Low pay hinders healthcare's hunt for cyber cops.

Authors:  Joseph Conn
Journal:  Mod Healthc       Date:  2017-01

6.  Cybersecurity in health care.

Authors:  Eric D Perakslis
Journal:  N Engl J Med       Date:  2014-07-31       Impact factor: 91.245

7.  When 'hacktivists' target your hospital.

Authors:  Daniel J Nigrin
Journal:  N Engl J Med       Date:  2014-07-31       Impact factor: 91.245

8.  Cryptography. Quantum spy games.

Authors:  Adrian Cho
Journal:  Science       Date:  2014-01-31       Impact factor: 47.728

Review 9.  Health Care and Cybersecurity: Bibliometric Analysis of the Literature.

Authors:  Mohammad S Jalali; Sabina Razak; William Gordon; Eric Perakslis; Stuart Madnick
Journal:  J Med Internet Res       Date:  2019-02-15       Impact factor: 5.428

Review 10.  Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

Authors:  Patricia Ah Williams; Andrew J Woodward
Journal:  Med Devices (Auckl)       Date:  2015-07-20
  10 in total
  7 in total

1.  Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities.

Authors:  Dari Alhuwail; Eiman Al-Jafar; Yousef Abdulsalam; Shaikha AlDuaij
Journal:  Appl Clin Inform       Date:  2021-09-29       Impact factor: 2.762

2.  Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.

Authors:  Liu Hua Yeo; James Banfield
Journal:  Perspect Health Inf Manag       Date:  2022-03-15

3.  Public Health Innovation through Cloud Adoption: A Comparative Analysis of Drivers and Barriers in Japan, South Korea, and Singapore.

Authors:  Aarthi Raghavan; Mehmet Akif Demircioglu; Araz Taeihagh
Journal:  Int J Environ Res Public Health       Date:  2021-01-05       Impact factor: 3.390

4.  A qualitative research study of primary care physicians' views of telehealth in delivering postnatal care to women.

Authors:  Zhimin Poon; Ngiap Chuan Tan
Journal:  BMC Prim Care       Date:  2022-08-13

Review 5.  Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).

Authors:  Liat Wasserman; Yair Wasserman
Journal:  Front Digit Health       Date:  2022-08-11

6.  The Impact of a Cyberattack at a Radiation Oncology Department: Immediate Response and Future Preparedness.

Authors:  Michael Oliver; Andrew Pearce; Laurie Stillwaugh; Konrad Leszczynski
Journal:  Adv Radiat Oncol       Date:  2022-06-17

7.  Phishing simulation exercise in a large hospital: A case study.

Authors:  Fabio Rizzoni; Sabina Magalini; Alessandra Casaroli; Pasquale Mari; Matt Dixon; Lynne Coventry
Journal:  Digit Health       Date:  2022-03-16
  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.