The Connection Between Hackers and Their Affinity Towards Healthcare
Abstract
Keywords
Full Text:
PDFReferences
Adil, M., Khan, M. K., Kumar, N., Attique, M., Farouk, A., Guizani, M., & Jin, Z. (2024). Healthcare Internet of Things: Security Threats, Challenges and Future Research Directions. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2024.3360289
Cyber-Attacks by Type. Download Scientific Diagram. (n.d.). Retrieved March 15, 2024, from https://www.researchgate.net/figure/Cyber-Attacks-by-Type_fig2_359155431
Healthcare Data Breach Statistics. (n.d.). Retrieved March 14, 2024, from https://www.hipaajournal.com/healthcare-data-breach-statistics/
Kaur, M., Singh, D., Kumar, V., Gupta, B. B., & Abd El-Latif, A. A. (2021). Secure and energy efficient-based E-health care framework for green internet of things. IEEE Transactions on Green Communications and Networking, 5(3), 1223-1231.
https://doi.org/10.1109/TGCN.2021.3081616
Ke, J., Wang, W., & Foutz, N. Z. (2022). Heterogeneous consumer response and mitigation toward healthcare data breach: Insights from location big data. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4029103
Kelly, B., Quinn, C., Lawlor, A., Killeen, R., & Burrell, J. (2023). Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health, 213-231. https://doi.org/10.1007/978-3-031-11199-0_11
Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22(2), 177-183. https://doi.org/10.1016/j.eij.2020.07.003
Mikuletič, S., Vrhovec, S., Skela-Savič, B., & Žvanut, B. (2024). Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security, 136, 103489.
https://doi.org/10.1016/j.cose.2023.103489
Parker, M. (2023). Managing threats to health data and information: toward security. In Health Information Exchange (pp. 149-196). Academic Press. https://doi.org/10.1016/B978-0- 323-90802-3.00016-2
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature review on the cyber security. International Journal of scientific research and management, 9(12), 669-710. https://dx.doi.org/10.18535/ijsrm/v9i12.ec04
Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021). https://doi.org/10.1007/s42452-021-04156-9
Roumani, Y. (2022). Detection time of data breaches. Computers & Security, 112, 102508. https://doi.org/10.1016/j.cose.2021.102508
Schmitz-Berndt, S. (2023). Defining the reporting threshold for a cybersecurity incident under the NIS directive and the NIS 2 directive. Journal of Cybersecurity, 9(1). https://doi.org/10.1093/cybsec/tyad009
The Cost of Cyberattacks in Healthcare in 2023 - Intraprise Health. (n.d.). Retrieved March 15, 2024, from https://intraprisehealth.com/the-cost-of-cyberattacks-in-healthcare
Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the internet of medical things. Health Policy and Technology, 10(3), 100549.
https://doi.org/10.1016/j.hlpt.2021.100549
van Boven, L. S., Kusters, R. W., Tin, D., van Osch, F. H., De Cauwer, H., Ketelings, L., & Barten, D. G. (2024). Hacking acute care: a qualitative study on the health care impacts of ransomware attacks against hospitals. Annals of emergency medicine, 83(1), 46-56. https://doi.org/10.1016/j.annemergmed.2023.04.025
Van der Kleij, R., Schraagen, J. M., Cadet, B., & Young, H. (2022). Developing decision support for cybersecurity threat and incident managers. Computers & Security, 113, 102535. https://doi.org/10.1016/j.cose.2021.102535
Van Uhm, D., South, N., & Wyatt, T. (2021). Connections between trades and trafficking in wildlife and drugs. Trends in Organized Crime, 24(4), 425-446. https://doi.org/10.1007/s12117-021-09416-z
Wasserman, L., & Wasserman, Y. (2022). Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health, 4. https://doi.org/10.3389/fdgth.2022.862221
Wenhua, Z., Qamar, F., Abdali, T. A. N., Hassan, R., Jafri, S. T. A., & Nguyen, Q. N. (2023). Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics, 12(3), 546. https://doi.org/10.3390/electronics12030546
DOI: https://doi.org/10.53889/citj.v3i2.837
Article Metrics
Abstract view : 21 timesPDF - 6 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Cybersecurity and Innovative Technology Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.

