2022
DOI: 10.1016/j.cmpbup.2022.100071
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy in the internet of things healthcare systems: Toward a robust solution in real-life deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Additionally, adopting a data minimization strategy ensures that only necessary and relevant health data are collected, reducing the risk associated with unnecessary data exposure. These principles collectively contribute to a privacy-centric approach that aligns with regulatory frameworks and ethical considerations [44].…”
Section: Security and Privacy Considerationsmentioning
confidence: 99%
“…Additionally, adopting a data minimization strategy ensures that only necessary and relevant health data are collected, reducing the risk associated with unnecessary data exposure. These principles collectively contribute to a privacy-centric approach that aligns with regulatory frameworks and ethical considerations [44].…”
Section: Security and Privacy Considerationsmentioning
confidence: 99%
“…Transparency, informed consent, and user control must be prioritized by stakeholders, who must encourage collaboration between healthcare professionals, technology firms, politicians, and pregnant women. These initiatives can help strike a balance between achieving the promise of IoT devices and resolving privacy and security concerns [96].…”
Section: Cay Et Al [55]mentioning
confidence: 99%
“…Theme/sub-theme Authors Emerging technology trends that contribute to cybersecurity vulnerability in the healthcare sector Medical Internet of Things (MIoT) (Jagadeeswari et al, 2018;Sadek et al, 2022;Sun et al, 2018) Big data (Abouelmehdi et al, 2018 (Jalali, Razak, Gordon, Perakslis, & Madnick, 2019;Meisner, 2018) Inadequate investments in cybersecurity measures (Abouzakhar, Jones, & Angelopoulou, 2017;Meisner, 2018) Cybersecurity countermeasures and mitigation strategies Blockchain technology for security (Attaran, 2020;El-Gazzar & Stendal, 2020;Jennath, Anoop, & Asharaf, 2020;Nagasubramanian et al, 2020;Shah & Khan, 2020;Shi et al, 2020;Siyal et (Bhuyan et al, 2020;Elhoseny et al, 2021;Habib et al, 2019;Shah & Khan, 2020) 3.1 Emerging Technology Trends that Contribute to Cybersecurity Vulnerability in the Healthcare Sector…”
Section: Table 2: Summaries Of Research Findingsmentioning
confidence: 99%
“…One of the factors that drive the vulnerability of the healthcare sector to cybersecurity attacks is advancements in new technologies and the pressure on the sector to adopt them at the height of the Covid-19 pandemic (Petracca et al, 2020). The adoption of technologies like MIoT (Sadek, Codjo, Rehman, & Abdulrazak, 2022;Sun et al, 2018), cloud computing (Ali, Shrestha, Soar, & Wamba, 2018;Dang, Piran, Han, Min, & Moon, 2019), big data (Abouelmehdi, Beni-Hessane, & Khaloufi, 2018;Jagadeeswari, Subramaniyaswamy, Logesh, & Vijayakumar, 2018), and m-health apps (Galetsi, Katsaliaki, & Kumar, 2022;Magrabi et al, 2019) have opened healthcare data to cyberattacks.…”
Section: Table 2: Summaries Of Research Findingsmentioning
confidence: 99%
See 1 more Smart Citation