Cyber Risk in Health Facilities: A Systematic Literature Review
Abstract
:1. Introduction
2. Materials and Methods
- (a)
- Publications’ trend—number of documents and citations by year, subject areas, documents by country, most keywords, and methodological information (theoretical research, e.g., literature review, descriptive; or empirical research, e.g., case study, action research);
- (b)
- Document information—aim and risk/s dealt for each paper.
3. Results
4. Discussion
- The considerable scholars’ effort on the topic in the last two years. However, the results describe a great need for further research. The total number of documents is not enough to answer to the cyber risk management challenge in the healthcare sector.
- The Medicine area as the most subject area. The literature calls studies to other subject areas such as Business, Management and Accounting, Social Science, and Mathematics.
- The United States as the most prolific country. This analysis outlines a gap in the study of this topic in many countries.
- The analytical method as the most research approaches utilized. The inquiry encourages empirical research to contribute to practical knowledge on this topic.
- Computer security, risk management, and risk assessment were the most often used keywords. There are not enough studies that use cyber risk such as keyword.
- Good knowledge of cyber risks was linked to the use of technology in the healthcare sector (e.g., telemedicine, electronic medical record, and mobile health). However, there are not holistic studies that introduce all cyber risks linked to the use of technology in the healthcare sector.
- Numerous publications related to the study of some subclasses of operational cybersecurity risks such as Deliberate, Software, and Process control topics. Furthermore, this analysis outlines a gap in the study of the class ‘External Events’.
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
Publications’ Aim | Subclass |
to explain criminal behavior reliant on computing and the online domain with particular characteristics and motivations such as being young, male, autistic and motivated by challenge [92] | 1.2 |
to explain like most breaches are the result of employee carelessness and/or failure to comply with information security policies and procedures, but to external hackers, too [19] | 1.1 |
to empirically test a proposed conceptual model, using integrated concepts from the Theory of Planned Behavior, the Information Security Policy Compliance Theory, and the aggregated Revealed Causal Map of EMR Resistance [36] | 1.3 |
to explain the key construction processes of the model which include initialization, data appending, scale expansion, data query, and verification to protect the integrity and privacy of the healthcare-related data [93] | 2.2 |
to analyze the risks and security threats comprehensively and institute appropriate countermeasures to protect patients and improve telemedicine quality for patient safety [16] | 2.2 |
to examine parent perspectives about electronic consultations, including perceived benefits and risks, anticipated informational needs, and preferences for parent engagement with electronic consultations [94] | 2.2 |
to explain like biosecurity can be dangerous for data breaches and disruption of operations at biological facilities from cyber-attacks [88] | 2.2 |
to explore cybersecurity aspects of microbial NGS and to discuss the motivations and objectives for such as attack, its feasibility and implications, and highlight policy considerations aimed at threat mitigation [89] | 2.2 |
to present a risk assessment feature integrated into the Socio-Technical Risk-Adaptable Access Control model, as well as the operationalization of the related mobile health decision policies [18] | 2.2 |
to present a deep recurrent neural network solution as a stacked long short-term memory with a pre-training as a regularization method to avoid random network initialization [95] | 2.2 |
to explain like physical systems are influenced by dynamic and evolving technologies, environments, and attack mechanisms with rapidly changing and difficult to detect and manage the vulnerabilities [70] | 3.2 |
to examine the potential cyber risks arising from the application of IoT devices-linked insurance [71] | 3.2 |
to report on an internal evaluation targeting hospital staff and summarize peer-reviewed literature regarding phishing and healthcare [24] | 1.2 |
to classifying the variety of cyber risks so that they can be addressed appropriately and can help to develop a common language for the science [91] | 2.2 |
to present a taxonomy of ten widely-used PMDs (personal medical devices) based on the five diseases they were designed to treat and to provide a comprehensive survey that covers 17 possible attacks aimed at PMDs, as well as the attacks’ building blocks [90] | 2.2 |
to present a systematic identification and evaluation of potential privacy risks, particularly emphasizing controls and mitigation strategies to handle negative privacy impacts [40] | 2.2 |
to propose a fog computing security and privacy protection solution and to design the security and privacy protection framework based on the fog computing to improve telehealth and telemedicine infrastructure [64] | 2.2 |
to detail the development and execution of three novel high-fidelity clinical simulations designed to teach clinicians to recognize, treat, and prevent patient harm from vulnerable medical devices [39] | 2.1 |
to determine whether the approach used in Australia to regulate mobile medical applications is consistent with international standards and is suitable to address the unique challenges of these technologies [41] | 2.2 |
to define several potential cybersecurity weaknesses in today’s pathogen genome databases to raise awareness [42] | 2.2 |
to propose a novel maturity model for health-care cloud security, which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics [72] | 3.2 |
to use innovative technology in healthcare to treat, diagnose and monitor patients [43] | 2.2 |
to investigate medical information security to gain a better understanding of trends in research related to medical information security [96] | 1.2 |
to present a novel approach, called BotDet, for botnet Command and Control traffic detection to defend against malware attacks in critical ultrastructure systems [44] | 2.2 |
to develop a model of factors associated with healthcare data breaches. Variables were operationalized as the healthcare facilities’ level of exposure, level of security, and organizational factors [45] | 2.2 |
to record public and physicians’ awareness, expectations for, and ethical concerns about the use of EHRs [46] | 2.2 |
to provide a minimal level of cybersecurity, but there are deficiencies in the standard and identifies the important aspects of cybersecurity that could be improved [73] | 3.2 |
to exploit of cybersecurity vulnerabilities can affect fielded medical devices today. Indeed, unmitigated cybersecurity vulnerabilities have already led to medical devices being infected and disabled by malware [74] | 3.2 |
to develop an enterprise risk inventory for healthcare organizations to create a common understanding of how each type of risk impacts a healthcare organization [86] | 4.3 |
to establish that stakeholders have a shared responsibility to address cybersecurity threats that can affect such devices [47] | 2.2 |
to explain like hackers attack healthcare aren’t after credit card numbers; they’re looking for data-rich electronic health records [26] | 1.2 |
to explain the heightened interest and increased spending on health IT security [27] | 1.2 |
to describe the underlying causes of some of the largest health care data breaches of the past several years and provide practical advice on how future data breaches could be prevented [28] | 1.2 |
to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures [48] | 2.2 |
to explain a new health record storage architecture, the personal grid eliminates this risk by separately storing and encrypting each person’s record [68] | 2.3 |
to explain like new vulnerabilities can emerge from the malicious behavior of threat actors and these attacks can be sudden and unexpected [49] | 2.2 |
to explain like organizations must look at different approaches to data protection [87] | 4.3 |
to present several security attacks on Lu et al.’s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack [29] | 1.2 |
to monitor the high-risk patients and to protect the patient’s data from intruders at anytime and anywhere through android APP [30] | 1.2 |
to explain like medical devices can be attacked from hackers and the role of companies to create a security system [50] | 2.2 |
to describe a methodical process to ensure medical device cybersecurity at a 400-bed tertiary care medical center [51] | 2.2 |
to explain the cyber risk management for the healthcare industry [52] | 2.2 |
to evaluate whether potential users in healthcare organizations can exploit the GST technique to share lessons learned from security incidents [75] | 3.2 |
to explain like cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve [76] | 3.2 |
to re-examine and analyze the causal factors behind healthcare data breaches, using the Swiss Cheese Model to shed light on the technical, organizational, and human factors of these breaches [31] | 1.2 |
to include the effects of medical identity fraud on patient compliance, brand, and profitability [32] | 1.2 |
to explore the importance of medical device cybersecurity and the consequences of security breaches [53] | 2.2 |
to explain like preventing data breaches has become more complex, and at the same time, the fines being levied against health care organizations for violating the Health Insurance Portability and Accountability Act Privacy and Security Rules are becoming larger [54] | 2.2 |
to propose a framework that includes the most important security processes regarding cloud computing in the health care sector [77] | 3.2 |
to suggest that cyber threats are increasing and that much of the U.S. healthcare system is ill-equipped to deal with them [33] | 1.2 |
to discuss the actions taken by standards bodies, such as the Association for the Advancement of Medical Instrumentation, to improve medical device cybersecurity [55] | 2.2 |
to identify and sketch the policy implications of using HSNS and how policymakers and stakeholders should elaborate upon them to protect the privacy of online health data [67] | 2.2 |
to risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform [56] | 2.2 |
to build on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production level [57] | 2.2 |
to explain what people can do if the protected information is breached [58] | 2.2 |
to focus on protecting all ePHI stored in and transmitted via smartphones. This includes a cryptographic scheme required to address the problem [78] | 3.2 |
to describe why incorporating an understanding of human behavior into cybersecurity products and processes can lead to more effective technology [59] | 2.2 |
to address cyber threats, governments, industry, and consumers should support collective cyber defenses modeled on efforts to address human illnesses [60] | 2.2 |
to present a detailed public health framework-including descriptions of public health threats encountered and interventions used-and develop parallels between public health and cybersecurity threats and interventions [79] | 3.2 |
to explain like a threat modeling methodology, known as attack tree, is employed to analyze attacks affecting EHR systems [17] | 3.2 |
to not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are implemented in their everyday operations [20] | 1.1 |
to address the problem of improper use of health data and introduce a methodology that protects medical records from unauthorized access, leaving the patient the choice to decide which people are authorized to use his data [34] | 1.2 |
to emphasis on security issues, which can arise inside a virtual healthcare community and relate to the communication and storage of data [21] | 1.1 |
to provide an overview of the current methodologies used to ensure data security, and a description of one successful approach to balancing access and privacy [37] | 1.3 |
to examine the security issues for the implementation of e-healthcare using currently available healthcare standards and proposes solutions and recommendations to secure the future of e-healthcare [35] | 1.2 |
to present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms [61] | 2.2 |
to analyze clinicians’ health information system privacy and security experiences in the practice context [62] | 2.2 |
to preserve the privacy and security of patients’ portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure [63] | 2.2 |
to propose MedIMob for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop-based clients [97] | 2.2 |
to explain like the consequences of a cyber-attack or privacy breach could be operationally and financially catastrophic, so an HCO’s move toward an enterprise-wide approach at identifying and minimizing risk, cyber and privacy liability should be on the radar screen for risk managers and leadership [98] | 2.2 |
to develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews [99] | 2.2 |
to develop a model-based approach towards end-to-end security which is defined as continuous security from point of origin to point of destination in a communication process [80] | 3.2 |
to guide the security essentials necessary to promote best practice for information security [81] | 3.2 |
to explain that the system addressed threats and vulnerabilities in the privacy and security of protected health information [85] | 3.3 |
to explain like the software program began an insidious assault on the hospital’s network, seeking out and copying files from every hard drive it could find [22] | 1.1 |
to explain like who get involved in security compliance can be unique and valuable assets to their organizations and to patient privacy [38] | 1.3 |
to describe information security design, implementation, management, and auditing inside a multi-specialty provincial Italian hospital [100] | 3.2 |
to explain like information systems using public or private networks become vulnerable to outside attacks every time new servers are added or firewalls are updated [101] | 2.2 |
to explain like information technology is a key component in both defending against and aiding terrorism threats and other forms of terrorism, cybersecurity - national (and global) critical information infrastructure protection [66] | 2.2 |
to explain like organizations must embark on an arduous journey to identify their vulnerabilities and come up with strategies to plug their security holes. To do so, they must conduct a gap analysis to determine those vulnerabilities and a risk assessment to set a policy framework [83] | 3.2 |
to explain like healthcare risk managers should be aware of their organizations’ electronic activities, the new risks brought about by these activities and alternative measures that can be taken to reduce or transfer the risks [84] | 3.2 |
to present the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures [65] | 2.2 |
to give an overview of current trends in the security aspects of health-care information systems [102] | 2.2 |
to examine the nature of security in the context of health care and explores the importance of the identification of risk [69] | 3.1 |
References
- Reason, J. Human error: Models and management. Br. Med. J. 2000, 320, 768–770. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kandasamy, K.; Srinivas, S.; Achuthan, K.; Rangan, V.P. IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020, 8, 1–18. [Google Scholar] [CrossRef]
- Öǧüt, H.; Raghunathan, S.; Menon, N. Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self-Protection. Risk Anal. 2011, 31, 497–512. [Google Scholar] [CrossRef]
- Mukhopadhyay, A.; Chatterjee, S.; Saha, D.; Mahanti, A.; Sadhukhan, S.K. Cyber-risk decision models: To insure IT or not? Decis. Support Syst. 2013, 56, 11–26. [Google Scholar] [CrossRef]
- Tchankova, L. Risk identification—Basic stage in risk management. Environ. Manag. Health 2002, 13, 290–297. [Google Scholar] [CrossRef]
- Böhme, R.; Schwartz, G. Models and Measures for Correlation in Cyber-Insurance. WEIS 2006, 2, 3. [Google Scholar]
- Biener, C.; Eling, M.; Wirfs, J.H. Insurability of cyber risk: An empirical analysis. Geneva Pap. Risk Insur. Issues Pract. 2015, 40, 131–158. [Google Scholar] [CrossRef] [Green Version]
- Cebula, J.J.; Young, L.R. A Taxonomy of Operational Cyber Security Risks. Carnegie Mellon Univ. Pittsburgh Softw. Eng. Inst. 2010, 1–47. [Google Scholar] [CrossRef]
- Ilinitch, A.Y.; Soderstrom, N.S.; Thomas, T.E. Measuring corporate environmental performance. J. Account. Public Policy 1998, 17, 383–408. [Google Scholar] [CrossRef]
- Taticchi, P.; Garengo, P.; Nudurupati, S.S.; Tonelli, F.; Pasqualino, R. A review of decision-support tools and performance measurement and sustainable supply chain management. Int. J. Prod. Res. 2015, 53, 6473–6494. [Google Scholar] [CrossRef]
- Sardi, A.; Sorano, E. Dynamic Performance Management: An Approach for Managing the Common Goods. Sustainability 2019, 11, 6435. [Google Scholar] [CrossRef] [Green Version]
- Verbano, C.; Crema, M. Guidelines for overcoming hospital managerial challenges: A systematic literature review. Ther. Clin. Risk Manag. 2013, 9, 427. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Tranfield, D.; Denyer, D.; Smart, P. Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review. Br. J. Manag. 2003, 14, 207–222. [Google Scholar] [CrossRef]
- Sardi, A.; Sorano, E.; Garengo, P.; Cantino, V. Big data and performance measurement research: Trends, evolution and future opportunities. Meas. Bus. Excell. 2020. [Google Scholar] [CrossRef]
- Ryu, S. Telemedicine: Opportunities and Developments in Member States: Report on the Second Global Survey on eHealth 2009 (Global Observatory for eHealth Series, Volume 2). Healthc. Inform. Res. 2012, 18, 153–155. [Google Scholar] [CrossRef]
- Kim, D.-W.; Choi, J.-Y.; Han, K.-H. Risk management-based security evaluation model for telemedicine systems. BMC Med. Inform. Decis. Mak. 2020, 20, 1–14. [Google Scholar] [CrossRef]
- Almulhem, A. Threat modeling for electronic health record systems. J. Med. Syst. 2012, 36, 2921–2926. [Google Scholar] [CrossRef]
- Moura, P.; Fazendeiro, P.; Inácio, P.R.M.; Vieira-Marques, P.; Ferreira, A. Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps. J. Healthc. Eng. 2020, 2020. [Google Scholar] [CrossRef] [Green Version]
- Kessler, S.R.; Pindek, S.; Kleinman, G.; Andel, S.A.; Spector, P.E. Information security climate and the assessment of information security risk among healthcare employees. Health Inform. J. 2020, 26, 461–473. [Google Scholar] [CrossRef]
- Coons, L.R. Security breaches: Tips for assessing and limiting your risks. J. Med. Pract. Manag. 2011, 26, 385–388. [Google Scholar]
- Chryssanthou, A.; Varlamis, I.; Latsiou, C. A risk management model for securing virtual healthcare communities. Int. J. Electron. Healthc. 2011, 6, 95–116. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Colias, M. Infotech. Cyber security. Health care learns to share scares and solutions. Hosp. Health Netw. 2004, 78, 60–64. [Google Scholar] [PubMed]
- Payne, R.L. Eupsychian management and the millennium. J. Manag. Psychol. 2000, 15, 219–226. [Google Scholar] [CrossRef]
- Priestman, W.; Anstis, T.; Sebire, I.G.; Sridharan, S.; Sebire, N.J. Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ Health Care Inform. 2019, 26. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kim, H.-W.; Park, J.H.; Jeong, Y.-S. Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure. Neurocomputing 2018, 279, 19–26. [Google Scholar] [CrossRef]
- Pratt, M.K. How cyberattacks can impact physicians. Med. Econ. 2016, 93, 43–44. [Google Scholar] [PubMed]
- Conn, J. Cybersecurity rising as health IT concern. Mod. Healthc. 2016, 46, 31–34. [Google Scholar] [PubMed]
- Perakslis, E.D.; Stanley, M. A cybersecurity primer for translational research. Sci. Transl. Med. 2016, 8, 322ps2. [Google Scholar] [CrossRef] [Green Version]
- Amin, R.; Islam, S.K.H.; Biswas, G.P.; Khan, M.K.; Obaidat, M.S. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Med. Syst. 2015, 39, 137. [Google Scholar] [CrossRef]
- Dhanalakshmi, T.G.; Bharathi, N. Secure M-health patient monitoring and emergency alert system framework. Res. J. Pharm. Biol. Chem. Sci. 2015, 6, 476–484. [Google Scholar]
- Kamoun, F.; Nicho, M. Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention. Int. J. Healthc. Inf. Syst. Inform. 2014, 9, 42–60. [Google Scholar] [CrossRef]
- Mcneal, M. Hacking health care. Mark. Health Serv. 2014, 34, 17–21. [Google Scholar]
- Harries, D.; Yellowlees, P.M. Cyberterrorism: Is the U.S. healthcare system safe? Telemed. E Health 2013, 19, 61–66. [Google Scholar] [CrossRef] [PubMed]
- Neubauer, T.; Heurix, J. A methodology for the pseudonymization of medical data. Int. J. Med. Inform. 2011, 80, 190–204. [Google Scholar] [CrossRef]
- Tsai, F.S. Security issues in e-healthcare. J. Med. Biol. Eng. 2010, 30, 209–214. [Google Scholar] [CrossRef]
- Samhan, B. Can cyber risk management insurance mitigate healthcare providers’ intentions to resist electronic medical records? Int. J. Healthc. Manag. 2020, 13, 12–21. [Google Scholar] [CrossRef]
- Lane, J.; Schur, C. Balancing access to health data and privacy: A review of the issues and approaches for the future. Health Serv. Res. 2010, 45, 1456–1467. [Google Scholar] [CrossRef]
- Walsh, T. The Proof Is in the Policy. J. Am. Health Inf. Manag. Assoc. 2004, 75, 24–28. [Google Scholar]
- Dameff, C.J.; Selzer, J.A.; Fisher, J.; Killeen, J.P.; Tully, J.L. Clinical Cybersecurity Training Through Novel High-Fidelity Simulations. J. Emerg. Med. 2019, 56, 233–238. [Google Scholar] [CrossRef]
- Iwaya, L.H.; Fischer-Hübner, S.; Åhlfeldt, R.-M.; Martucci, L.A. Mobile health systems for community-based primary care: Identifying controls and mitigating privacy threats. J. Med. Internet Res. 2019, 7. [Google Scholar] [CrossRef] [Green Version]
- Moshi, M.R.; Parsons, J.; Tooher, R.; Merlin, T. Evaluation of Mobile Health Applications: Is Regulatory Policy up to the Challenge? Int. J. Technol. Assess. Health Care 2019, 35, 351–360. [Google Scholar] [CrossRef] [PubMed]
- Vinatzer, B.A.; Heath, L.S.; Almohri, H.M.J.; Stulberg, M.J.; Lowe, C.; Li, S. Cyberbiosecurity challenges of pathogen genome databases. Front. Bioeng. Biotechnol. 2019, 7, 106. [Google Scholar] [CrossRef] [PubMed]
- Jump, M. Fighting cyberthreats with technology solutions. Biomed. Instrum. Technol. 2019, 53, 38–43. [Google Scholar] [CrossRef] [PubMed]
- Ghafir, I.; Prenosil, V.; Hammoudeh, M.; Baker, T.; Jabbar, S.; Khalid, S.; Jaf, S. BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access 2018, 6, 38947–38958. [Google Scholar] [CrossRef]
- McLeod, A.; Dolezel, D. Cyber-analytics: Modeling factors associated with healthcare data breaches. Decis. Support Syst. 2018, 108, 57–68. [Google Scholar] [CrossRef]
- Entzeridou, E.; Markopoulou, E.; Mollaki, V. Public and physician’s expectations and ethical concerns about electronic health record: Benefits outweigh risks except for information security. Int. J. Med. Inform. 2018, 110, 98–107. [Google Scholar] [CrossRef]
- Webb, T.; Dayal, S. Building the wall: Addressing cybersecurity risks in medical devices in the USA and Australia. Comput. Law Secur. Rev. 2017, 33, 559–563. [Google Scholar] [CrossRef]
- Blanke, S.J.; McGrady, E. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist. J. Healthc. Risk Manag. 2016, 36, 14–24. [Google Scholar] [CrossRef]
- Jump, M. AAMI TIR97: A vital resource in the postmarket management of medical device security. Biomed. Instrum. Technol. 2016, 53, 462–464. [Google Scholar] [CrossRef]
- Holden, W.L. The vital role of device manufacturers as cybercitizens. Biomed. Instrum. Technol. 2015, 49, 410–422. [Google Scholar] [CrossRef]
- Upendra, P.; Prasad, P.; Jones, G.; Fortune, H. Operationalizing medical device cybersecurity at a tertiary care medical center. Biomed. Instrum. Technol. 2015, 49, 251–258. [Google Scholar] [CrossRef] [PubMed]
- HMT Mag. Healthcare organizations lack tools for cyber situational awareness and threat assessment. Health Manag. Technol. 2015, 36, 30. [Google Scholar]
- Coronado, A.J.; Wong, T.L. Healthcare cybersecurity risk management: Keys to an effective plan. Biomed. Instrum. Technol. 2014, 48, 26–30. [Google Scholar] [CrossRef]
- Zamosky, L. Avoid the breach: Put data security measures in place. Physician Exec. 2014, 40, 82–84. [Google Scholar]
- Fu, K.; Blum, J. Controlling for cybersecurity risks of medical device software. Commun. ACM 2013, 56, 35–37. [Google Scholar] [CrossRef]
- Henriksen, E.; Burkow, T.M.; Johnsen, E.; Vognild, L.K. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC Med. Inform. Decis. Mak. 2013, 13, 85. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shoffner, M.; Owen, P.; Mostafa, J.; Lamm, B.; Wang, X.; Schmitt, C.P.; Ahalt, S.C. The secure medical research workspace: An it infrastructure to enable secure research on clinical data. Clin. Transl. Sci. 2013, 6, 222–225. [Google Scholar] [CrossRef]
- Sorensen, D. Be prepared for breaches of protected patient information. Med. Econ. 2013, 90, 40. [Google Scholar]
- Pfleeger, S.L.; Caputo, D.D. Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 2012, 31, 597–611. [Google Scholar] [CrossRef]
- Charney, S. Collective defense: Applying the public-health model to the internet. IEEE Secur. Priv. 2012, 10, 54–59. [Google Scholar] [CrossRef]
- Zhao, J.; Peng, K.; Leng, J.; Sun, X.; Zhang, Z.; Xue, W.; Ren, L. A study on an information security system of a regional collaborative medical platform. Telemed. E Health 2010, 16, 746–750. [Google Scholar] [CrossRef] [PubMed]
- Fernando, J.I.; Dawson, L.L. The health information system security threat lifecycle: An informatics theory. Int. J. Med. Inform. 2009, 78, 815–826. [Google Scholar] [CrossRef]
- Huang, L.-C.; Chu, H.-C.; Lien, C.-Y.; Hsiao, C.-H.; Kao, T. Privacy preservation and information security protection for patients’ portable electronic health records. Comput. Biol. Med. 2009, 39, 743–750. [Google Scholar] [CrossRef]
- Gu, J.; Huang, R.; Jiang, L.; Qiao, G.; Du, X.; Guizani, M. A fog computing solution for context-based privacy leakage detection for android healthcare devices. Sensors 2019, 19, 1184. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lambrinoudakis, D.G.C. A data protection scheme for a remote vital signs monitoring healthcare service. Med. Inform. Internet Med. 2000, 25, 207–224. [Google Scholar] [CrossRef] [PubMed]
- Kun, L.G. Homeland security: The possible, probable, and perils of information technology. IEEE Eng. Med. Biol. Mag. 2002, 21, 28–33. [Google Scholar] [CrossRef]
- Li, J. Privacy policies for health social networking sites. J. Am. Med. Inform. Assoc. 2013, 20, 704–707. [Google Scholar] [CrossRef] [Green Version]
- Yasnoff, W.A. A secure and efficiently searchable health information architecture. J. Biomed. Inform. 2016, 61, 237–246. [Google Scholar] [CrossRef]
- Davey, J. The role of risk analysis in European harmonisation of security for healthcare information systems. Comput. Methods Programs Biomed. 1995, 48, 133–137. [Google Scholar] [CrossRef]
- Chatterjee, S.; Thekdi, S. An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems. Reliab. Eng. Syst. Saf. 2020, 193, 106664. [Google Scholar] [CrossRef]
- Leong, Y.-Y.; Chen, Y.-C. Cyber risk cost and management in IoT devices-linked health insurance. Geneva Pap. Risk Insur. Issues Pract. 2020, 1–23. [Google Scholar] [CrossRef]
- Akinsanya, O.O.; Papadaki, M.; Sun, L. Towards a maturity model for health-care cloud security (M2HCS). Inf. Comput. Secur. 2019. [Google Scholar] [CrossRef]
- Anderson, S.; Williams, T. Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge? Comput. Stand. Interfaces 2018, 56, 134–143. [Google Scholar] [CrossRef]
- Paulsen, J.E.; Hazelett, M.B.; Schwartz, S.B. CIED cybersecurity risks in an increasingly connected world. Circulation 2018, 138, 1181–1183. [Google Scholar] [CrossRef] [PubMed]
- He, Y.; Johnson, C. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template. Int. J. Med. Inform. 2015, 84, 941–949. [Google Scholar] [CrossRef] [Green Version]
- Williams, P.A.H.; Woodward, A.J. Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Med. Devices Evid. Res. 2015, 8, 305–316. [Google Scholar] [CrossRef] [Green Version]
- Haufe, K.; Dzombeta, S.; Brandis, K. Proposal for a security management in cloud computing for health care. Sci. World J. 2014, 2014. [Google Scholar] [CrossRef] [Green Version]
- Velez, D.; Shanblatt, M. Protecting stored and transmitted mhealth patient data. Biomed. Instrum. Technol. 2013, 47, 46–53. [Google Scholar] [CrossRef]
- Rowe, B.; Halpern, M.; Lentz, T. Is a public health framework the cure for cyber security? CrossTalk 2012, 25, 30–38. [Google Scholar]
- Wozak, F.; Schabetsberger, T.; Ammmenwerth, E. End-to-end Security in Telemedical Networks—A Practical Guideline. Int. J. Med. Inform. 2007, 76, 484–490. [Google Scholar] [CrossRef]
- Munk, C. ISBT guidelines for information security in transfusion medicine. Vox Sang. 2006, 91, S1–S23. [Google Scholar] [CrossRef]
- Trucco, P.; Cavallin, M. A quantitative approach to clinical risk assessment: The CREA method. Saf. Sci. 2006, 44, 491–513. [Google Scholar] [CrossRef]
- Goedert, J. The first steps toward security. Health Data Manag. 2001, 9, 26. [Google Scholar] [PubMed]
- Switzer, D.P. Network liability: A new frontier for healthcare risk management. J. Healthc. Risk Manag. 2001, 21, 3–13. [Google Scholar] [CrossRef]
- Collmann, J.; Alaoui, A.; Nguyen, D.; Lindisch, D. Safe teleradiology: Information assurance as project planning methodology. J. Am. Med. Inform. Assoc. 2005, 12, 84–89. [Google Scholar] [CrossRef]
- Etges, A.P.B.D.S.; Grenon, V.; Lu, M.; Cardoso, R.B.; de Souza, J.S.; Kliemann Neto, F.J.; Felix, E.A. Development of an enterprise risk inventory for healthcare. BMC Health Serv. Res. 2018, 18, 578. [Google Scholar] [CrossRef]
- Goedert, J. Meeting the Threat of Ransomware: Rising challenge demands new approach to security strategy. Health Data Manag. 2016, 24, 39–41. [Google Scholar]
- Moritz, R.L.; Berger, K.M.; Owen, B.R.; Gillum, D.R. Promoting biosecurity by professionalizing biosecurity A credential system could improve policy and practice. Science 2020, 367, 856–858. [Google Scholar] [CrossRef]
- Fayans, I.; Motro, Y.; Rokach, L.; Oren, Y.; Moran-Gilad, J. Cyber security threats in the microbial genomics era: Implications for public health. Eurosurveillance 2020, 25, 1900574. [Google Scholar] [CrossRef]
- Kintzlinger, M.; Nissim, N. Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems. J. Biomed. Inform. 2019, 95, 103233. [Google Scholar] [CrossRef]
- Falco, G.; Eling, M.; Jablanski, D.; Weber, M.; Miller, V.; Gordon, L.A.; Wang, S.S.; Schmit, J.; Thomas, R.; Elvedi, M.; et al. Cyber risk research impeded by disciplinary barriers. Science 2019, 366, 1066–1069. [Google Scholar] [CrossRef] [PubMed]
- Payne, K.; Maras, K.L.; Russell, A.J.; Brosnan, M.J.; Mills, R. Self-reported motivations for engaging or declining to engage in cyber-dependent offending and the role of autistic traits. Res. Dev. Disabil. 2020, 104, 103681. [Google Scholar] [CrossRef] [PubMed]
- Xu, J.; Wei, L.; Wu, W.; Wang, A.; Zhang, Y.; Zhou, F. Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener. Comput. Syst. 2020, 108, 1287–1296. [Google Scholar] [CrossRef]
- Verma, R.; Krishnamurti, T.; Ray, K.N. Parent perspectives on family-centered pediatric electronic consultations: Qualitative study. J. Med. Internet Res. 2020, 22, e16954. [Google Scholar] [CrossRef] [PubMed]
- Jahromi, A.N.; Hashemi, S.; Dehghantanha, A.; Parizi, R.M.; Choo, K.R. An Enhanced Stacked LSTM Method with No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 85, 88–96. [Google Scholar] [CrossRef]
- Kim, Y.-W.; Cho, N.; Jang, H.-J. Trends in research on the security of medical information in Korea: Focused on information privacy security in hospitals. Healthc. Inform. Res. 2018, 24, 61–68. [Google Scholar] [CrossRef]
- Bønes, E.; Hasvold, P.; Henriksen, E.; Strandenæs, T. Risk analysis of information security in a mobile instant messaging and presence system for healthcare. Int. J. Med. Inform. 2007, 76, 677–687. [Google Scholar] [CrossRef]
- McDonough, W.J. Cyber risk and privacy liability: A click in the right direction? J. Healthc. Risk Manag. 2007, 27, 9–12. [Google Scholar] [CrossRef]
- Schattner, P.; Pleteshner, C.; Bhend, H.; Brouns, J. Guidelines for computer security in general practice. J. Innov. Health Inform. 2007, 15, 73–82. [Google Scholar] [CrossRef] [Green Version]
- Cavalli, E.; Mattasoglio, A.; Pinciroli, F.; Spaggiari, P. Information security concepts and practices: The case of a provincial multi-specialty hospital. Int. J. Med. Inform. 2004, 73, 297–303. [Google Scholar] [CrossRef]
- Briggs, B. Watch dog sniffs out weak links. Health Data Manag. 2003, 11, 38–40. [Google Scholar] [PubMed]
- Smith, E.; Eloff, J.H.P. Security in health-care information systems—Current trends. Int. J. Med. Inform. 1999, 54, 39–54. [Google Scholar] [CrossRef]
Dataset | Elsevier’s Scopus and Web of Science | ||
Time | From the first publication (date 1992) to 2020 | ||
Document Type | Article and Review | ||
Source Type | Journal | ||
Keywords | “Cyber” or “Computer security” | and | “Health” and “Risk” |
1 | We read 419 publications’ titles from Scopus and Web of Science and selected 149 publications |
2 | We read 149 publications’ abstracts and selected 84 documents useful to the aim of the research |
3 | We read 84 publications to describe the main information on cyber risk in the health facilities |
Keyword | No. | Keyword | No. |
---|---|---|---|
Computer Security | 68 | Health Insurance | 17 |
Human | 38 | Electronic Medical Record | 16 |
Risk Management | 35 | Electronic Health Records | 14 |
Risk Assessment | 32 | Medical Information System | 14 |
Confidentiality | 30 | Electronic Health Record | 12 |
Humans | 30 | Health Insurance Portability and Accountability Act | 12 |
United States | 24 | Internet | 12 |
Health Risks | 21 | Medical Informatics | 12 |
Privacy | 21 | Patient Information | 12 |
Health Care | 19 | Security of Data | 12 |
Organization and Management | 19 | Cyber Security | 11 |
Priority Journal | 18 | Review | 11 |
Class | Subclass | No. | References |
---|---|---|---|
1 Actions of People | 1.1 Inadvertent | 4 | [19,20,21,22] |
1.2 Deliberate | 13 | [23,24,25,26,27,28,29,30,31,32,33,34,35] | |
1.3 Inaction | 3 | [36,37,38] | |
2 Systems and Technology Failures | 2.1 Hardware | 1 | [39] |
2.2 Software | 42 | [16,18,37,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67] | |
2.3 Systems | 1 | [68] | |
3 Failed Internal Processes | 3.1 Process design or execution | 1 | [69] |
3.2 Process controls | 16 | [17,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84] | |
3.3 Supporting processes | 1 | [85] | |
4 External Events | 4.1 Hazards | 0 | |
4.2 Legal issues | 0 | ||
4.3 Business issues | 2 | [86,87] | |
4.4 Service dependencies | 0 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sardi, A.; Rizzi, A.; Sorano, E.; Guerrieri, A. Cyber Risk in Health Facilities: A Systematic Literature Review. Sustainability 2020, 12, 7002. https://doi.org/10.3390/su12177002
Sardi A, Rizzi A, Sorano E, Guerrieri A. Cyber Risk in Health Facilities: A Systematic Literature Review. Sustainability. 2020; 12(17):7002. https://doi.org/10.3390/su12177002
Chicago/Turabian StyleSardi, Alberto, Alessandro Rizzi, Enrico Sorano, and Anna Guerrieri. 2020. "Cyber Risk in Health Facilities: A Systematic Literature Review" Sustainability 12, no. 17: 7002. https://doi.org/10.3390/su12177002
APA StyleSardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2020). Cyber Risk in Health Facilities: A Systematic Literature Review. Sustainability, 12(17), 7002. https://doi.org/10.3390/su12177002