2016
DOI: 10.1126/scitranslmed.aaa4493
|View full text |Cite
|
Sign up to set email alerts
|

A cybersecurity primer for translational research

Abstract: Researchers have responsibilities and liabilities when it comes to the protection of biomedical data from cybersecurity breaches, but the simplest protections are often the most important.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…In the practical consideration of privacy, security, and compliance, it can be helpful to separate compliance from privacy and security, as compliance tends to be retrospective in nature, but ensuring privacy and security must be proactive and forward‐looking . Much has been written about general and advanced privacy and security with respect to medical data and devices .…”
Section: Challengesmentioning
confidence: 99%
“…In the practical consideration of privacy, security, and compliance, it can be helpful to separate compliance from privacy and security, as compliance tends to be retrospective in nature, but ensuring privacy and security must be proactive and forward‐looking . Much has been written about general and advanced privacy and security with respect to medical data and devices .…”
Section: Challengesmentioning
confidence: 99%
“…to establish that stakeholders have a shared responsibility to address cybersecurity threats that can affect such devices [47] 2.2 to explain like hackers attack healthcare aren't after credit card numbers; they're looking for data-rich electronic health records [26] 1.2 to explain the heightened interest and increased spending on health IT security [27] 1.2 to describe the underlying causes of some of the largest health care data breaches of the past several years and provide practical advice on how future data breaches could be prevented [28] 1.2 to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures [48] 2.2 to explain a new health record storage architecture, the personal grid eliminates this risk by separately storing and encrypting each person's record [68] 2.3…”
Section: Discussionmentioning
confidence: 99%
“…As demonstrated in the case of genomic ( 62 ) and electrophysiological data ( 63 ), maliciously re-identifying anonymous data is within reach of sufficiently skilled offenders. Given the sensitive nature of data regarding cognition ( 64 ) and given the frequency of spectacular health data breaches ( 65 ), data security represents a priority. It follows that efficient regulatory and technical measures to shore up data security are key to scientific progress in the field.…”
Section: A Way Forward: the Need For An Integrative Approachmentioning
confidence: 99%