Figure 2 - uploaded by Rania Daraghmeh
Content may be subject to copyright.
Top Cyber Risks Targeting EHRs

Top Cyber Risks Targeting EHRs

Context in source publication

Context 1
... on the review of recent studies, this investigation proposes Fig. 2 that indicates the top cyber-risks that target EHR and this is further confirmed by [10]. ...

Citations

... As networking in the production environment increases, the number of attack surfaces also increases, making cybersecurity a critical concern for companies. 52 Organisational Information Security Management Maturity Model [97] The paper discusses the importance of Information Security Management (ISM) in protecting the confidentiality, integrity, and availability of information in organizations. Despite compliance with ISM requirements, many organizations continue to suffer from security incidents, indicating low maturity levels in ISM implementation. ...
Article
Full-text available
In today’s world, private and government organizations are legally obligated to prioritize their information security. They need to provide proof that they are continually improving their cybersecurity compliance. One approach that can help organizations achieve this goal is implementing information security maturity models. These models provide a structured framework for measuring performance and implementing best practices. However, choosing a suitable model can be challenging, requiring cultural, process, and work practice changes. Implementing multiple models can be overwhelming, if possible. This article proposes a prioritization strategy for public institutions that want to improve their information security maturity. We thoroughly analyzed various sources through systematic mapping to identify critical similarities in information security maturity models. Our research led us to create the AIM (Awareness, Infrastructure, and Management) Triad. This triad is a practical guide for organizations to achieve maturity in information security practices.
... 11 The disciplines were health, computer science and engineering, and management and social sciences. The identified topics were related to diverse areas such as clinical disciplines, 12,13 managerial 14,15 and operational matters, [16][17][18] quality improvement, 19,20 knowledge management, 21-23 data analytics, 24,25 policy, 26 governance, 16,[27][28][29] or particular DH constructs such as social media, 30,31 software processes, cybersecurity, 32 or standards for digital data quality 33 and interoperability. 34,35 The settings were mostly hospital-based and secondary care, with relatively few on primary care or community. ...
Article
Objective: A literature review of capability maturity models (MMs) to inform the conceptualization, development, implementation, evaluation, and mainstreaming of MMs in digital health (DH). Methods: Electronic databases were searched using "digital health," "maturity models," and related terms based on the Digital Health Profile and Maturity Assessment Toolkit Maturity Model (DHPMAT-MM). Covidence was used to screen, identify, capture, and achieve consensus on data extracted by the authors. Descriptive statistics were generated. A thematic analysis and conceptual synthesis were conducted. Findings: Diverse domain-specific MMs and model development, implementation, and evaluation methods were found. The spread and pattern of different MMs verified the essential DH foundations and five maturity stages of the DHPMAT-MM. An unanticipated finding was the existence of a new category of community-facing MMs. Common characteristics included:1. A dynamic lifecycle approach to digital capability maturity, which is:a. responsive to environmental changes and may improve or worsen over time;b. accumulative, incorporating the attributes of the preceding stage; andc. sequential, where no maturity stage must be skipped.2. Sociotechnical quality improvement of the DH ecosystem and MM, which includes:a. investing in the organization's human, hardware, and software resources andb. a need to engage and improve the DH competencies of citizens. Conclusions: The diversity in MMs and variability in methods and content can create cognitive dissonance. A metamodel like the DHPMAT-MM can logically unify the many domain-specific MMs and guide the overall implementation and evaluation of DH ecosystems and MMs over the maturity lifecycle.
Article
Full-text available
O avanço para a transformação digital requer critérios específicos na produção e preservação de informações digitais. Um modelo de maturidade pode ser aplicado para avaliar e aprimorar a gestão de documentos, identificando áreas de melhoria e fornecendo orientação para o desenvolvimento de ações. Diante da falta de modelos específicos para a gestão de documentos digitais, formula-se o seguinte problema de pesquisa: O que é necessário e como desenvolver um modelo conceitual para avaliação de maturidade da gestão de documentos digitais? Sendo assim, o presente estudo tem como objetivo analisar pesquisas sobre modelos de maturidade aplicados na gestão de documentos, visando extrair subsídios que contribuam com a elaboração de um modelo de maturidade a ser utilizado na gestão arquivística de documentos digitais. A metodologia utilizada foi a pesquisa bibliográfica com base em revisão sistemática de literatura (RSL), quando selecionaram-se 40 trabalhos recuperados de bases de dados científicas, e por meio da análise de conteúdo foram categorizados os conceitos relacionados: aos modelos de maturidade, domínios de aplicação, exemplares de modelos de maturidade, metodologias utilizadas para a elaboração de modelos de maturidade, assim como descrição dos componentes que estruturam os modelos. Como resultados, em relação à metodologia de elaboração de modelos, ressalta-se o método Design Science Research (DSR) na criação de modelos de maturidade robustos e práticos, com base em oito requisitos científicos definidos por Becker, Knackstedt e Pöppelbuß (2009). No tocante à composição dos modelos de maturidade, revelou-se a eficácia de modelos compostos por cinco estágios de avaliação do Capability Maturity Model Integration (CMMI), integrados por critérios referenciados em normas e modelos internacionais de gestão e preservação de documentos. Quanto aos métodos de avaliação, as pesquisas analisadas destacaram a autoavaliação como uma estratégia eficaz em termos de custo-benefício. Como conclusão, constatou-se que as discussões sobre as temáticas categorizadas e embasadas pelas pesquisas analisadas proporcionam uma base sólida para o desenvolvimento de um modelo de maturidade eficiente na gestão arquivística de documentos digitais.
Article
Interactions in healthcare, by necessity, involve sharing sensitive information to achieve high-quality patient outcomes. Therefore, sensitive data must be carefully protected. This paper explores existing privacy and security research conducted in the context of healthcare organizations. We conducted a systematic literature review of N = 1553 papers that examine the security and privacy of healthcare data and focus on 80 papers addressing human factors. Key findings show that much of the healthcare security and privacy research is focused on technology (44.11%, 712 papers), with a lack of emphasis on the human element (4.96%, 80 papers). In the subset of user studies, we find that patients and the general public express concerns about privacy and security with technologies like electronic health records (EHRs). Furthermore, our analysis shows that healthcare professionals often have low awareness of risks related to data security. Additionally, our analysis revealed that most research focuses narrowly on large hospitals, neglecting private practices and the unique challenges they face. We conclude by identifying research gaps and providing potential solutions to enable robust data security for sensitive patient data.
Article
INTRODUCTION: Digital transformation is becoming an integral part of modern healthcare. Medical organizations are paying increasing attention to the integration of information technologies to optimize processes and improve the quality of medical care. This article provides an overview of methodologies and models for assessing digital maturity in medical organizations specializing in primary healthcare: international and Russian experience. Systematization of knowledge about various approaches to assessing digital maturity in medical organizations, including primary healthcare. As part of this article, scientific publications, regulatory legal acts and the works of researchers who studied methods for assessing digital maturity, as well as other materials, are considered. The used methods of analysis and synthesis permitted to identify the main models for assessing the digital maturity of primary healthcare medical organizations. For these purposes, the theoretical analysis and generalization of the above materials was performed. The article examines various approaches to assessing digital maturity offered by international organizations such as HIMSS EMRAM, DIAM and others, presents their features, parameters and assessment levels that permit to evaluate the readiness of medical organizations to use digital technologies and effectively integrate information systems into medical practice. Special attention is paid to Russian experience in assessing digital maturity in primary care medical organizations, from a practical point of view as well. Examples of evaluating digital solutions in Russian medicine are given. During the review of methodologies and models for assessing digital maturity, a variety of approaches and tools presented by various organizations were considered. The studied models are aimed at assessing the readiness of medical organizations for digital transformation. CONCLUSION: International and Russian experience in this field contains various methods for assessing digital maturity. The development of methods for assessing the digital maturity of medical organizations, including the primary healthcare ones, is a key factor in ensuring affordable and high-quality medical care.
Chapter
Full-text available
The new coronavirus, which produces a highly contagious sickness, enters the picture. Globally, the coronavirus disease (COVID-19) has boosted the use of Internet commerce. It has resulted in an increase in the number of FTUs, or first-time e-commerce users, in India, who were previously unable to purchase online. Customers are depending on Amazon more than ever before in their social isolation and self-quarantine attempts, according to Amazon, one of the country’s and the world’s major e-commerce businesses (https://retail.economictimes.indiatimes.com/re-tales/impact-of-covid-19-on-onlineshopping-in-india/4115). The goal of this study is to determine the elements that influence customers’ online purchases of mobile phones, as well as how that practice has altered since the global COVID-19 outbreak. An online survey was done, and data were gathered from primary sources to interpret the objectives. The goal of the study is to figure out how successful online advertising is at raising awareness and what the link is between Internet advertising and purchasing decisions.KeywordsCovid-19E-commerceMarketingConsumer choiceInternet advertising
Chapter
The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and its applications. Hence, the quantity of big data has grown tremendously in the era of smart city life. Thus concern for security of big data has risen. The attacks currently faced by big databases such as misuse, misrepresentation, modification, and unauthorized users and such attacks have increased in number. To ensure the security of big data stores to prevent misuse, misrepresentation, modification, and unauthorized users issues related to insecurity in storage units and not rendering it vulnerable to attackers, it is needed to enhance the secrecy, privacy, and increase the capacity for hiding secret cover. While cryptography guarantees authentication, integrity, non-repudiation, etc. In this paper, the author has studied popular data hiding techniques, especially steganography and cryptography used for provides security to big databases.KeywordsVulnerableAuthenticationSmart cityRobustnessAuthenticity