Annotation+Bibliography
pdf
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
465
Subject
Health Science
Date
Dec 6, 2023
Type
Pages
6
Uploaded by Quiensala32
1
Annotated Bibliography
Quiensala Hamilton
University of Phoenix
HCS/465
Yvette Mallory
Oct. 12, 2023
2
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in
healthcare: A systematic review of modern threats and trends.
Technology & Health
Care
,
25
(1), 1–10.
https://doi.org/10.3233/THC-161263
Healthcare technology has been growing constantly. Even though the government is making an
attempt by enforcing laws and regulations (HIPPA 1996) to protect sensitive information cyber-
attacks are still a concern. In 2015 alone Healthcare organizations are far behind when it comes to
protecting patients’ information and confidentiality. This systematic review using quantitative
approach to collect information was taken to study and focus on relevant information pertaining to
threats, identifying cybersecurity trends, ransomware and ways to improve using literature within a
time frame from 2006 to current.
Also, a descriptive research approach was taken to provide details
on the problem. All literature came from United States Database disregarding any information that
was not in English. Out of 472 articles 31 articles met the goal of the study. In 2015 there was an
increase in cyber-attacks, resulting in the compromise of 112 million records. Cybersecurity is the
technique of preventing harmful assaults on computers, servers, mobile devices, electronic systems,
networks, and data. Healthcare technology has been growing constantly. Healthcare organizations are
adopting and updating system but only 5% are staying current with trends and cybersecurity updates
causing healthcare organizations to be the most vulnerable in the industry. Updated security policy
and systems needs to be focused more on. Staff needs to be trained and updated on trends of cyber-
attacks. This means pouring more money and time into cyber security and ensuring that security
measures taken is compatible with the needs of the organization.
3
Nifakos, S., Chandramouli, K., Nikolaou, C. K., Papachristou, P., Koch, S., Panaousis,
E., & Bonacina, S. (2021). Influence of Human Factors on Cyber Security within
Healthcare Organizations: A Systematic Review.
Sensors (14248220)
,
21
(15),
5119.
https://doi.org/10.3390/s21155119
As technology is changing rapidly the healthcare industry is not keeping up when it comes to
protecting themselves from cybercriminals. The purpose of this study is to identify threats and
cyber security measures that the healthcare industry will need to implement to prevent future
cyberattacks such as emails that is intended to be harmful. The authors analyze empirically the
effects of solution availability and vulnerability information disclosure on attacks that target the
vulnerability.
Hackers often look for gaps in the network. These gaps are usually through employees.
Understanding the human behavior can lead to solutions to protecting organizations against
cybercriminals.
Human behavior is one of the often-observed aspects that affect the cybersecurity postures of
healthcare organizations. Attacks on human vulnerabilities are now occurring. This article's main
goal is to detect cybersecurity issues, such as ransomware, suggested solutions by reviewing
literature about organizational risk assessment methodology from United States databases. Given
that healthcare is a target for cyberattacks, it is critical to recognize the symptoms and understand
how cyberattacks might have an impact on the healthcare industry. The medical industry must
adopt trends that will shield it from online threats. According to WHO technology such as
medical devices, and smart phones and medical devices that allows patient to manage and
physicians to monitor the health of their patient is a concern.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Researcher used data from United States
databases by using methodical search
techniques, even
though there was no targeted population than the healthcare Organizational literature was also
used to prove how healthcare service disruption might result in significant issues both worldwide
and in Europe. A quantitative method was used to find all the literature, which was restricted to
the last 12 years. The researchers Adopting the guidelines PRISMA methodology. Five step
research questions focused on the effectiveness, education, training, and cyber defense strategies
to overcome cyber-attacks The outcome was 70 articles that provided information on the need to
adopt cyber security measures. There were 64 journal papers and 6 conference papers.
Adopting the guidelines PRISMA methodology. Five step research questions focused on the
effectiveness, education and training and cyber defense strategies. Within the 70 articles
evidence of on phishing was identified as an ongoing problem. It is essential that stakeholders
are trained and are aware of trends.
Understanding human
behavior is essential to recognizing inconsistencies and avoiding breaches,
as well as being one of the primary threats to a secure network. A successful job depends on
knowing the technical ins and outs of network security, but behavioral analysis skills are
becoming more in-demand
Hacker’s search for the simplest way into an organization's network,
which is through gullible staff. No matter how secure the information is, a mistakes stakeholders
can result in a hack. To prevent repeating errors, training and education are crucial. Put
cybersecurity safeguards in place to protect the firm against cybercriminals, such as system
lockdowns.
5
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health
information systems: A systematic review.
Technology & Health Care
,
24
(1), 1–9.
https://doi.org/10.3233/THC-151102
Information about systems used by the healthcare company, such the EHR, is extremely
sensitive. Patients now have complete access to their medical records when using this system,
The EHR not only gives patients access to their medical records, but it also analyzes data to
produce better results in terms of patient safety. As a serious menace and ongoing worry,
cyberattacks are on the rise. This systematic review focuses on threats that may have a huge
impact on healthcare and how can the healthcare industry be prepared for. Using a descriptive
approach relevant on cyber activities selected.
The focus of the review researches the impact of
threats and to identify gaps that allows cyber-attacks.
There was no population but information
from United States healthcare research databases was used.
6
The quantitative technique was employed in this systematic review to find data that was pertinent
to the goal. There were 19 articles that was chosen. The author concluded that the vulnerability
of new medical gadgets was responsible for some of the biggest breaches.
Covered entities must keep their policies, staff, and system upgrades to comply with HIPPA's
requirements. When it comes to patient safety, one of the most prevalent issues is a lack of
information inside the healthcare sector.
Laws and regulations have influenced the healthcare industry. To decrease negative patient
outcomes related to medication, healthcare practitioners are adopting the National Patient Safety
Goals. Despite of adopting ways to have better patient safety healthcare must be willing to put
money and time into cybersecurity. Healthcare organizations should develop technology
solutions, policies, and practices that enable breaches to be recognized quickly when they do
occur in addition to taking actions to lessen the possibility of insider breaches.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help