2020
DOI: 10.1080/02684527.2020.1752459
|View full text |Cite
|
Sign up to set email alerts
|

Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(39 citation statements)
references
References 80 publications
2
37
0
Order By: Relevance
“…Furthermore, health services staff often have limited previous experience with remote working and with planning for this change, which leaves the sector vulnerable to cyberattacks [ 9 , 14 , 19 ]. As health services make use of a variety of medical devices, interconnectivity and interoperability create issues as they are now being accessed from outside health services’ internal network perimeter.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Furthermore, health services staff often have limited previous experience with remote working and with planning for this change, which leaves the sector vulnerable to cyberattacks [ 9 , 14 , 19 ]. As health services make use of a variety of medical devices, interconnectivity and interoperability create issues as they are now being accessed from outside health services’ internal network perimeter.…”
Section: Resultsmentioning
confidence: 99%
“…Likewise, VPNs also have some known and unknown vulnerabilities, both on the client and server side, which have been exploited for years by cybercriminals [ 19 ]. The DDoS attacks on health care systems [ 14 ] and the innumerable wireless connected devices [ 9 ] have created further challenges to a remote work environment.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…[4]- [10]. Subsequently, nowadays FHE has been widely adopted for cloud security [11] [12], e-health care privacy [13], blockchain, [14] i.e., artificial intelligence Cortex blockchain adopted somewhat FHE (SWFHE) to train and infer the model. The first generation methods, however, were somewhat similar, but they had different theoretical assumptions with complex methodologies.…”
Section: Introductionmentioning
confidence: 99%