Author
Listed:
- Adegoke Adebukola
- Achen Navya
- Foreman Jordan
- Nwaobi Jenifer
- Richard D. Begley
Abstract
Purpose: Cyber security incidents are posing an increasing risk to the healthcare industry. The healthcare industry has lagged behind other industries in protecting its most important stakeholder (patients), and hospitals must now invest significant capital and effort in protecting their systems. The goal of this research was to understand the complexities of the operating environment as well as document the technological vulnerabilities to avoid cybersecurity incidents. The eight Aggregated Response Strategies (EARS) framework contains 8 methodologies, which could be used by all the personnel in medical services associations. The secondary hypothesis derived out of this research was the six-step plans introduced by the American Health Association, which aided in ensuring cybersecurity with facilities and organizations in cases of potential threat. Methodology: The methodology used to derive this hypothesis was through literary reviews, which constituted research articles, journals, and peer-reviewed articles published between 2005 and 2021. These were obtained from PubMed, Google scholar, NCBI, ScienceDirect, CDC.gov, CMS.gov, and Census.gov databases. Finding: The finding suggested overall security awareness and training must be established immediately after a potential threat is detected. Authorities advise against paying ransomware attackers since there is no assurance that an attack will be reversed, Law enforcement should be immediately contacted in the event of a ransomware attack besides cloud data backups will make it simple to rebuild networks, disaster recovery planning should be done before a cybersecurity threat occurs. Cyber Security as a Threat to Health Care Adegoke Adebukola, Achen Navya, Foreman Jordan, Nwaobi Jenifer, Richard D. Begley Marshall University Department of Computer Science and Engineering Building Corresponding Author's Email: adegoke@marshall.edu ABSTRACT Purpose: Cyber security incidents are posing an increasing risk to the healthcare industry. The healthcare industry has lagged behind other industries in protecting its most important stakeholder (patients), and hospitals must now invest significant capital and effort in protecting their systems. The goal of this research was to understand the complexities of the operating environment as well as document the technological vulnerabilities to avoid cybersecurity incidents. The eight Aggregated Response Strategies (EARS) framework contains 8 methodologies, which could be used by all the personnel in medical services associations. The secondary hypothesis derived out of this research was the six-step plans introduced by the American Health Association, which aided in ensuring cybersecurity with facilities and organizations in cases of potential threat. Methodology: The methodology used to derive this hypothesis was through literary reviews, which constituted research articles, journals, and peer-reviewed articles published between 2005 and 2021. These were obtained from PubMed, Google scholar, NCBI, ScienceDirect, CDC.gov, CMS.gov, and Census.gov databases. Finding: The finding suggested overall security awareness and training must be established immediately after a potential threat is detected. Authorities advise against paying ransomware attackers since there is no assurance that an attack will be reversed, Law enforcement should be immediately contacted in the event of a ransomware attack besides cloud data backups will make it simple to rebuild networks, disaster recovery planning should be done before a cybersecurity threat occurs.
Suggested Citation
Adegoke Adebukola & Achen Navya & Foreman Jordan & Nwaobi Jenifer & Richard D. Begley, 2022.
"Cyber Security as a Threat to Health Care,"
Journal of Technology and Systems, CARI Journals Limited, vol. 4(1), pages 32-64.
Handle:
RePEc:bhx:ojtjts:v:4:y:2022:i:1:p:32-64:id:1149
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojtjts:v:4:y:2022:i:1:p:32-64:id:1149. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/JTS/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.