Cybersecurity for eHealth 2021
DOI: 10.1201/9781003254416-3
|View full text |Cite
|
Sign up to set email alerts
|

Personal Cybersecurity for eHealth Deployments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Continuous personnel screening is an effective mitigation practice against insider threats. Malicious nonstate actors seek negligent insiders to help them target personal identifying information (PII) and personal health information (PHI) contained in electronic health records at medical practices [ 22 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Continuous personnel screening is an effective mitigation practice against insider threats. Malicious nonstate actors seek negligent insiders to help them target personal identifying information (PII) and personal health information (PHI) contained in electronic health records at medical practices [ 22 ].…”
Section: Introductionmentioning
confidence: 99%
“…The Federal Bureau of Investigation’s (FBI) list of January 6th capitol breach defendants [ 22 30 ];…”
Section: Introductionmentioning
confidence: 99%
“…The cross-domain access policy for a patient's protected medical records is determined by the patient. Each member of the medical staff must register with their respective medical facility in order to obtain the attribute secret key needed to decrypt the patient's encrypted files [6,7]. The below Figure 1 explains the role of Big Data in Healthcare Industry.…”
Section: Introductionmentioning
confidence: 99%