[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

M Javaid, A Haleem, RP Singh, R Suman - Cyber Security and Applications, 2023 - Elsevier
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …

Automated cyber and privacy risk management toolkit

G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …

Cybersecurity in health sector: a systematic review of the literature

CV Peve Herrera, JS Mendoza Valcarcel, M Díaz… - 2023 - repositorio.uwiener.edu.pe
Currently, health centers are being affected by various cyberattacks putting at risk the
confidential information of their patients and the organization because they do not have a …

Threat assessment and risk analysis (TARA) for interoperable medical devices in the operating room inspired by the automotive industry

A Puder, J Henle, E Sax - Healthcare, 2023 - mdpi.com
Prevailing trends in the automotive and medical device industry, such as life cycle
overarching configurability, connectivity, and automation, require an adaption of …

Information security risk assessment using situational awareness frameworks and application tools

NA Chandra, K Ramli, AAP Ratna, TS Gunawan - Risks, 2022 - mdpi.com
This paper describes the development of situational awareness models and applications to
assess cybersecurity risks based on Annex ISO 27001: 2013. The risk assessment method …

Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. Wade

Q Song, R Ma, Y Kou, X Gui - Proceedings of the ACM on Human …, 2024 - dl.acm.org
On June 24, 2022, the US Supreme Court overturned Roe v. Wade, which has led to full
bans on most abortions in 14 states within one year. Many people in the US use period and …

Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation

M Aijaz, M Nazir, MNA Mohammad - SN Computer Science, 2023 - Springer
In recent years, the healthcare-IT systems have undergone numerous technological
advancements. With the advent of implanted medical devices, the ubiquitous health is …

Supervised machine learning techniques to protect IoT healthcare environment against cyberattacks

S Kaddoura, A El Arid, A Al-Dulaimy - Intelligent Edge Computing for Cyber …, 2023 - Elsevier
Abstract The Internet of Things (IoT) have become the central technology of the current
years. Almost all industries are amalgamating the IoT in their production to enhance the …

[HTML][HTML] Balancing Talent and Technology: Navigating Cybersecurity and Privacy in SMEs

Y Hoong, D Rezania - Telematics and Informatics Reports, 2024 - Elsevier
This study examines the complexities of cybersecurity and privacy in Canadian SMEs,
emphasizing the nuanced interplay of internal motivations and external pressures. Utilizing …

[PDF][PDF] TECHNICAL ANALYSIS OF INTERNET SHUTDOWNS: ECONOMIC AND CYBERSECURITY DIMENSIONS IN INDIA AND INTERNATIONAL CONTEXT

H CHOWDHARY, DNK CHAUDHARY… - Journal of Theoretical …, 2024 - jatit.org
This article delves into the multifaceted repercussions of internet shutdowns, with a specific
lens on their economic and cybersecurity implications in India and globally. The concept of …