2020
DOI: 10.1089/hs.2019.0123
|View full text |Cite
|
Sign up to set email alerts
|

Healthcare Challenges in the Era of Cybersecurity

Abstract: As a result of the extensive integration of technology into the healthcare system, cybersecurity incidents have become an increasing challenge for the healthcare industry. Recent examples include WannaCry, a nontargeted ransomware attack on more than 150 countries worldwide that temporarily crippled parts of the National Health Service in the United Kingdom, and the 2016 ransomware attack on Los Angeles's Hollywood Presbyterian Medical Center. The attacks cost millions of dollars in lost revenue and fines, as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 51 publications
(39 citation statements)
references
References 6 publications
0
38
0
1
Order By: Relevance
“…Gordon et al [31] There is low awareness in the health sector of cyber risks Furnell and Shah [32] The most common action taken in response to breaches or attacks is additional staff training or communication Coventry et al [33] Health staff has poor awareness of consequences of behavior, and there is a lack of policies and reinforcement of secure behavior Kaplan [34] There is a lack of pandemic-specific cybersecurity training campaigns, documented procedures, and guidance on revised procedures and technologies Inadequate board-level risk assessment communication Barad [35] There is a need for a matrix that can translate the strategic requirements of a health care system into prioritized cyber improvement needs Tully et al [36] There is a lack of understanding of security risks and its impact on organization-wide risk management Jones and Katzis [37] There is a lack of appreciation among health care executive management of the business risk impact associated with cyber breaches…”
Section: Lack Of Security Awarenessmentioning
confidence: 99%
See 1 more Smart Citation
“…Gordon et al [31] There is low awareness in the health sector of cyber risks Furnell and Shah [32] The most common action taken in response to breaches or attacks is additional staff training or communication Coventry et al [33] Health staff has poor awareness of consequences of behavior, and there is a lack of policies and reinforcement of secure behavior Kaplan [34] There is a lack of pandemic-specific cybersecurity training campaigns, documented procedures, and guidance on revised procedures and technologies Inadequate board-level risk assessment communication Barad [35] There is a need for a matrix that can translate the strategic requirements of a health care system into prioritized cyber improvement needs Tully et al [36] There is a lack of understanding of security risks and its impact on organization-wide risk management Jones and Katzis [37] There is a lack of appreciation among health care executive management of the business risk impact associated with cyber breaches…”
Section: Lack Of Security Awarenessmentioning
confidence: 99%
“…There is a lack of understanding of security risks and its impact on organization-wide risk management, such as impacts on patient care and clinical outcomes [36]. The health sector lacks a matrix that can translate the strategic improvement needs of a health care system into prioritized information/cyber improvement needs [35].…”
Section: Inadequate Board-level Risk Assessment Communicationmentioning
confidence: 99%
“…False positive rate It is defined as the probability of falsely rejecting the null hypothesis. The formula to find the FPR is given in Equation (6).…”
Section: Precisionmentioning
confidence: 99%
“…Researchers used big data to solve multidisciplinary problems more effectively. [5][6][7] In this work, big data is used to address the intrusion classification problem. The distributed processing avoids bottleneck situations during execution as per the literature.…”
Section: Introductionmentioning
confidence: 99%
“…Within Computer Science a “system” is characterized as: “ the collection of multiple entities such as devices (mobile phones, sensors) software (operating systems, development platforms, programs, apps), companies (device manufacturers, carrier, app stores), processes (networking, Short Message Service - SMS, database transactions), and end users/stakeholders (patients, IT managers, health care managers) . ” 1 Cybersecurity refers to “the protection of computer-based technology from deliberate or inadvertent disruption via manipulation of underlying software, hardware, or networked connections.” 2 There are currently software tools able to collect detailed data about the information and communication technology (ICT) infrastructure, and relate this information with cybersecurity data (vulnerabilities, severity, remediation measures, etc.) made available by international cybersecurity authorities.…”
Section: Introductionmentioning
confidence: 99%