2023
DOI: 10.30574/wjaets.2023.8.1.0050
|View full text |Cite
|
Sign up to set email alerts
|

A survey of healthcare sector digitization strategies: Vulnerabilities, countermeasures and opportunities

Abstract: The adoption of electronic healthcare in hospital environment can potentially reduce costs and improve the quality of life of the patients. However, numerous security and privacy issues arise when sensitive patient data is shared among multiple devices and users. Owing to its vulnerable nature, electronic health records seem to be more attractive to attackers compared to other forms of records such as financial transactions. Consequently, the patient data collected at the sensors, transmitted across communicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 189 publications
0
2
0
Order By: Relevance
“…Developing 4. Ethical, Security, and Privacy Considerations: Amid the sensitive nature of healthcare data, the architecture strongly emphasizes ethical regulations, security, and privacy [60] Robust security measures ensure that patient information remains confidential and protected from unauthorized access [62].…”
Section: Implementation Challengesmentioning
confidence: 99%
“…Developing 4. Ethical, Security, and Privacy Considerations: Amid the sensitive nature of healthcare data, the architecture strongly emphasizes ethical regulations, security, and privacy [60] Robust security measures ensure that patient information remains confidential and protected from unauthorized access [62].…”
Section: Implementation Challengesmentioning
confidence: 99%
“…However, complex encryption and authentication techniques cannot be implemented on these devices because of their limited computational capacity, memory, and power, which may result in increasing resource consumption and add extensive latency. As a result, these devices are susceptible to network and system attacks [33].…”
Section: Ioht Device Operating System Vulnerabilitymentioning
confidence: 99%