2019
DOI: 10.1007/978-3-030-31635-8_111
|View full text |Cite
|
Sign up to set email alerts
|

A Smartphone Based Survey to Investigate the Cyber-Risk Perception on the Health-Care Professionals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…The term Cybersecurity has recently been introduced to indicate the set of procedures and methodologies used to defend computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. Cybersecurity [ 1 , 2 , 3 ] is therefore applied to various contexts, from the economic one to that relating to mobile technologies and includes various actions: Network security : the procedures for using the network safely; Application Security : the procedures and solutions for using applications safely; Information security : the management of information in a secure way and in a privacy-sensitive manner in accordance with pre-established regulations; Operational security : the security in IT operations, such as, for example, in bank-type transactions; Disaster recovery and operational continuity : the procedures for restarting after problems that have affected the regular/routine operation of a system and to ensure operational continuity. For example, using informatic solutions such as an efficient disk mirroring and/or backup policy; End-user training : specific training for the actors involved in the use of the systems, which where necessary, must also include the citizen.…”
Section: Cybersecuritymentioning
confidence: 99%
See 4 more Smart Citations
“…The term Cybersecurity has recently been introduced to indicate the set of procedures and methodologies used to defend computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. Cybersecurity [ 1 , 2 , 3 ] is therefore applied to various contexts, from the economic one to that relating to mobile technologies and includes various actions: Network security : the procedures for using the network safely; Application Security : the procedures and solutions for using applications safely; Information security : the management of information in a secure way and in a privacy-sensitive manner in accordance with pre-established regulations; Operational security : the security in IT operations, such as, for example, in bank-type transactions; Disaster recovery and operational continuity : the procedures for restarting after problems that have affected the regular/routine operation of a system and to ensure operational continuity. For example, using informatic solutions such as an efficient disk mirroring and/or backup policy; End-user training : specific training for the actors involved in the use of the systems, which where necessary, must also include the citizen.…”
Section: Cybersecuritymentioning
confidence: 99%
“…Cyber attacks in the industry and consumer sectors have been widely echoed in the past and recent cyber attacks in the healthcare sector are of concern. Recently, for example, at the center of the debate were the attacks on health systems and the potential vulnerabilities that have come to light for some types of critical medical device (mostly active implantable) that can be connected to the network [ 1 , 2 ]. In several nations, there has generally been a delay in addressing cybersecurity issues compared to other nations, for example, the US.…”
Section: Cybersecurity and Health Carementioning
confidence: 99%
See 3 more Smart Citations