[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

M Javaid, A Haleem, RP Singh, R Suman - Cyber Security and Applications, 2023 - Elsevier
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …

A systematic review of multi perspectives on human cybersecurity behavior

RA Alsharida, BAS Al-rimy, M Al-Emran, A Zainal - Technology in Society, 2023 - Elsevier
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …

Medical image encryption by content-aware DNA computing for secure healthcare

Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost,
stolen, displaced, hacked, or communicated in personal health data could bring huge …

Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

Exploring the top five evolving threats in cybersecurity: an in-depth overview

M Mijwil, OJ Unogwu, Y Filali, I Bala… - Mesopotamian …, 2023 - mesopotamian.press
The term cybersecurity refers to an environment capable of protecting digital devices,
networks and information from unauthorized access and preventing data theft or alteration. It …

A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem

S Silvestri, S Islam, S Papastergiou, C Tzagkarakis… - Sensors, 2023 - mdpi.com
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …

A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital Health, 2023 - journals.sagepub.com
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …

Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Enhancing cybersecurity protocols in modern healthcare systems: Strategies and best practices

MU Tariq - Transformative Approaches to Patient Literacy and …, 2024 - igi-global.com
This chapter explores the crucial responsibility of strengthening cybersecurity measures
within the ever-changing context of contemporary healthcare systems. As digitalization gets …

Operational Research: methods and applications

F Petropoulos, G Laporte, E Aktas… - Journal of the …, 2024 - Taylor & Francis
Abstract Throughout its history, Operational Research has evolved to include methods,
models and algorithms that have been applied to a wide range of contexts. This …