IJEME Vol. 14, No. 6, 8 Dec. 2024
Cover page and Table of Contents: PDF (size: 555KB)
PDF (555KB), PP.1-19
Views: 0 Downloads: 0
Healthcare cybersecurity, Internet of Things, blockchain, artificial intelligence, patient data protection, Cyber threats, innovative approaches
The digital transformation of the healthcare sector has revolutionized operational efficiency and patient care, yet concurrently exposed healthcare organizations to unprecedented cybersecurity risks, jeopardizing patient confidentiality and organizational integrity. This study undertakes a comprehensive investigation into contemporary cybersecurity strategies and emerging trends within the healthcare industry. Through a meticulous examination of published literature from reputable databases, including PubMed/MEDLINE, CINAHL, and Web of Science, critical patterns and vulnerabilities are discerned, underlining the escalating frequency and severity of cyber threats such as ransomware and phishing attacks. Emphasizing the pivotal role of organizational cyber resilience governance and policies, the study identifies a notable gap in standardized cybersecurity risk assessment methodologies, signaling the urgent need for innovative approaches. In response to identified challenges, the research proposes the development of novel methodologies to fortify cybersecurity defenses and protect patient data. Leveraging cutting-edge technologies such as blockchain and artificial intelligence, the study advocates for proactive measures to mitigate emerging threats and ensure data security and patient privacy in healthcare environments. Moreover, the integration of end-to-end security measures and the adoption of DevOps methodologies are highlighted as promising avenues for enhancing cybersecurity resilience. Results from a systematic literature review underscore the imperative for ongoing research and collaboration to address cybersecurity challenges in healthcare effectively. By offering insights into key cybersecurity features, technologies, and responsibilities within the healthcare sector, this study aims to inform stakeholders and policymakers, facilitating the implementation of robust cybersecurity measures. Furthermore, the study presents key findings regarding the current state of cybersecurity in healthcare, including challenges faced and potential solutions identified through the research process. Ultimately, through concerted efforts and the utilization of innovative strategies, healthcare organizations can navigate the evolving cybersecurity landscape, safeguarding patient information and upholding the integrity of healthcare systems.
Sapna Kumari, Priyadarshini Pattanaik, Mohammad Zubair Khan, "Impact of Cybersecurity Measures in the Healthcare Sector: A Comprehensive Review of Contemporary Approaches and Emerging Trends", International Journal of Education and Management Engineering (IJEME), Vol.14, No.6, pp. 1-19, 2024. DOI:10.5815/ijeme.2024.06.01
[1]Cartwright, A.J., 2023. The elephant in the room: cybersecurity in healthcare. Journal of Clinical Monitoring and Computing, pp.1-10.
[2]Kiser, S. and Maniam, B., 2021. Ransomware: Healthcare industry at risk. Journal of Business and Accounting, 14(1), pp.64-81.
[3]Payne, B.K., He, W., Wang, C., Wittkower, D.E. and Wu, H., 2021. Cybersecurity, technology, and society: Developing an interdisciplinary, open, general education cybersecurity course. Journal of Information Systems Education, 32(2), pp.134-149
[4]Nifakos, S., Chandramouli, K., Nikolaou, C.K., Papachristou, P., Koch, S., Panaousis, E. and Bonacina, S., 2021. Influence of human factors on cyber security within healthcare organizations: A systematic review. Sensors, 21(15), p.5119.
[5]Martin, G., Martin, P., Hankin, C., Darzi, A. and Kinross, J., 2017. Cybersecurity and healthcare: how safe are we? Bmj, 358.
[6]Garcia-Perez, A., Cegarra-Navarro, J.G., Sallos, M.P., Martinez-Caro, E. and Chinnaswamy, A., 2023. Resilience in healthcare systems: Cyber security and digital transformation. Technovation, 121, p.102583.
[7]Dameff, C., Tully, J., Chan, T.C., Castillo, E.M., Savage, S., Maysent, P., Hemmen, T.M., Clay, B.J. and Longhurst, C.A., 2023. Ransomware attack associated with disruptions at adjacent emergency departments in the US. JAMA Network Open, 6(5), pp.e2312270-e2312270.
[8]MacColl, J., Hüsch, P., Mott, G., Sullivan, J., Nurse, J.R., Turner, S. and Pattnaik, N., 2024. Ransomware: Victim Insights on Harms to Individuals, Organisations and Society.
[9]Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and health care: Official Journal of the European Society for Engineering and Medicine, 25(1), 1–10. https://doi.org/10.3233/THC-161263
[10]Javaid, M., Haleem, A., Singh, R.P., & Suman, R. (2023). Cyber Security and Applications.
[11]Coventry, L. and Branley, D., 2018. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturates, 113, pp.48-52.
[12]Tully, J., Selzer, J., Phillips, J.P., O'Connor, P. and Dameff, C., 2020. Healthcare challenges in the era of cybersecurity. Health security, 18(3), pp.228-231.
[13]Pfleeger, S.L. and Caputo, D.D., 2012. Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), pp.597-611.
[14]Schneier, B., CORPORATE SECURITY THREATS WITHIN THE COMMUNICATION ASPECT. Nauka i tehnologija, p.69.
[15]Korpela, K., 2015. Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1-3), pp.72-77.
[16]Biener, C., Eling, M. and Wirfs, J.H., 2015. Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, 40, pp.131-158.
[17]Baer, W.S. and Parkinson, A., 2007. Cyberinsurance in its security management. IEEE Security & Privacy, 5(3), pp.50-56.
[18]Geetha, R. and Thilagam, T., 2021. A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28, pp.2861-2879.
[19]Ali, A., Rahim, H.A., Pasha, M.F., Dowsley, R., Masud, M., Ali, J. and Baz, M., 2021. Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics, 10(16), p.2034.
[20]Kumar, S., Biswas, B., Bhatia, M.S. and Dora, M., 2021. Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management, 34(6), pp.1597-1629.
[21]Kute, S.S., Tyagi, A.K. and Aswathy, S.U., 2022. Security, privacy and trust issues in internet of things and machine learning based e-healthcare. Intelligent Interactive Multimedia Systems for e-Healthcare Applications, pp.291-317.
[22]Drew, J., 2012. Managing cybersecurity risks. Journal of Accountancy, 214(2), p.44.
[23]Williams, C.M., Chaturvedi, R. and Chakravarthy, K., 2020. Cybersecurity risks in a pandemic. Journal of medical Internet research, 22(9), p.e23692.
[24]Morgan, G. and Gordijn, B., 2020. A care-based stakeholder approach to ethics of cybersecurity in business. The ethics of cybersecurity, 21, pp.119-138.
[25]Weber, K. and Kleine, N., 2020. Cybersecurity in health care. The Ethics of Cybersecurity, 21, pp.139-156.
[26]Pranggono, B. and Arabo, A., 2021. COVID‐19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), p.e247.
[27]Thamer, N. and Alubady, R., 2021, April. A survey of ransomware attacks for healthcare systems: Risks, challenges, solutions and opportunity of research. In 2021 1st Babylon International Conference on Information Technology and Science (BICITS) (pp. 210-216). IEEE.
[28]Montasari, R., 2023. Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom. Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity, pp.7-25.
[29]Thomasian, N.M. and Adashi, E.Y., 2021. Cybersecurity in the internet of medical things. Health Policy and Technology, 10(3), p.100549.