Annotation+Bibliography

pdf

School

University of Phoenix *

*We aren’t endorsed by this school

Course

465

Subject

Health Science

Date

Dec 6, 2023

Type

pdf

Pages

6

Uploaded by Quiensala32

Report
1 Annotated Bibliography Quiensala Hamilton University of Phoenix HCS/465 Yvette Mallory Oct. 12, 2023
2 Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends.   Technology & Health Care ,   25 (1), 1–10. https://doi.org/10.3233/THC-161263 Healthcare technology has been growing constantly. Even though the government is making an attempt by enforcing laws and regulations (HIPPA 1996) to protect sensitive information cyber- attacks are still a concern. In 2015 alone Healthcare organizations are far behind when it comes to protecting patients’ information and confidentiality. This systematic review using quantitative approach to collect information was taken to study and focus on relevant information pertaining to threats, identifying cybersecurity trends, ransomware and ways to improve using literature within a time frame from 2006 to current. Also, a descriptive research approach was taken to provide details on the problem. All literature came from United States Database disregarding any information that was not in English. Out of 472 articles 31 articles met the goal of the study. In 2015 there was an increase in cyber-attacks, resulting in the compromise of 112 million records. Cybersecurity is the technique of preventing harmful assaults on computers, servers, mobile devices, electronic systems, networks, and data. Healthcare technology has been growing constantly. Healthcare organizations are adopting and updating system but only 5% are staying current with trends and cybersecurity updates causing healthcare organizations to be the most vulnerable in the industry. Updated security policy and systems needs to be focused more on. Staff needs to be trained and updated on trends of cyber- attacks. This means pouring more money and time into cyber security and ensuring that security measures taken is compatible with the needs of the organization.
3 Nifakos, S., Chandramouli, K., Nikolaou, C. K., Papachristou, P., Koch, S., Panaousis, E., & Bonacina, S. (2021). Influence of Human Factors on Cyber Security within Healthcare Organizations: A Systematic Review.   Sensors (14248220) ,   21 (15), 5119. https://doi.org/10.3390/s21155119 As technology is changing rapidly the healthcare industry is not keeping up when it comes to protecting themselves from cybercriminals. The purpose of this study is to identify threats and cyber security measures that the healthcare industry will need to implement to prevent future cyberattacks such as emails that is intended to be harmful. The authors analyze empirically the effects of solution availability and vulnerability information disclosure on attacks that target the vulnerability. Hackers often look for gaps in the network. These gaps are usually through employees. Understanding the human behavior can lead to solutions to protecting organizations against cybercriminals. Human behavior is one of the often-observed aspects that affect the cybersecurity postures of healthcare organizations. Attacks on human vulnerabilities are now occurring. This article's main goal is to detect cybersecurity issues, such as ransomware, suggested solutions by reviewing literature about organizational risk assessment methodology from United States databases. Given that healthcare is a target for cyberattacks, it is critical to recognize the symptoms and understand how cyberattacks might have an impact on the healthcare industry. The medical industry must adopt trends that will shield it from online threats. According to WHO technology such as medical devices, and smart phones and medical devices that allows patient to manage and physicians to monitor the health of their patient is a concern.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Researcher used data from United States databases by using methodical search techniques, even though there was no targeted population than the healthcare Organizational literature was also used to prove how healthcare service disruption might result in significant issues both worldwide and in Europe. A quantitative method was used to find all the literature, which was restricted to the last 12 years. The researchers Adopting the guidelines PRISMA methodology. Five step research questions focused on the effectiveness, education, training, and cyber defense strategies to overcome cyber-attacks The outcome was 70 articles that provided information on the need to adopt cyber security measures. There were 64 journal papers and 6 conference papers. Adopting the guidelines PRISMA methodology. Five step research questions focused on the effectiveness, education and training and cyber defense strategies. Within the 70 articles evidence of on phishing was identified as an ongoing problem. It is essential that stakeholders are trained and are aware of trends. Understanding human behavior is essential to recognizing inconsistencies and avoiding breaches, as well as being one of the primary threats to a secure network. A successful job depends on knowing the technical ins and outs of network security, but behavioral analysis skills are becoming more in-demand Hacker’s search for the simplest way into an organization's network, which is through gullible staff. No matter how secure the information is, a mistakes stakeholders can result in a hack. To prevent repeating errors, training and education are crucial. Put cybersecurity safeguards in place to protect the firm against cybercriminals, such as system lockdowns.
5 Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health information systems: A systematic review. Technology & Health Care , 24 (1), 1–9. https://doi.org/10.3233/THC-151102 Information about systems used by the healthcare company, such the EHR, is extremely sensitive. Patients now have complete access to their medical records when using this system, The EHR not only gives patients access to their medical records, but it also analyzes data to produce better results in terms of patient safety. As a serious menace and ongoing worry, cyberattacks are on the rise. This systematic review focuses on threats that may have a huge impact on healthcare and how can the healthcare industry be prepared for. Using a descriptive approach relevant on cyber activities selected. The focus of the review researches the impact of threats and to identify gaps that allows cyber-attacks. There was no population but information from United States healthcare research databases was used.
6 The quantitative technique was employed in this systematic review to find data that was pertinent to the goal. There were 19 articles that was chosen. The author concluded that the vulnerability of new medical gadgets was responsible for some of the biggest breaches. Covered entities must keep their policies, staff, and system upgrades to comply with HIPPA's requirements. When it comes to patient safety, one of the most prevalent issues is a lack of information inside the healthcare sector. Laws and regulations have influenced the healthcare industry. To decrease negative patient outcomes related to medication, healthcare practitioners are adopting the National Patient Safety Goals. Despite of adopting ways to have better patient safety healthcare must be willing to put money and time into cybersecurity. Healthcare organizations should develop technology solutions, policies, and practices that enable breaches to be recognized quickly when they do occur in addition to taking actions to lessen the possibility of insider breaches.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help