Cyber Risk in Health Facilities: A Systematic Literature Review

被引:33
作者
Sardi, Alberto [1 ]
Rizzi, Alessandro [1 ]
Sorano, Enrico [1 ]
Guerrieri, Anna [2 ]
机构
[1] Univ Turin, Dept Management, I-10124 Turin, Italy
[2] Soc Hosp Assurances Mutuelles, I-10129 Turin, Italy
关键词
cyber risk; cyber-attack; cybersecurity; computer security; COVID-19; coronavirus; information technology risk; risk management; risk assessment; health facilities; healthcare sector; systematic literature review; insurance; INFORMATION SECURITY; CYBERSECURITY RISKS; MEDICAL DEVICES; CARE; MANAGEMENT; PRIVACY; GUIDELINES; MODELS; POLICY; ISSUES;
D O I
10.3390/su12177002
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector during the COVID-19 pandemic, the cyber risk. Since the beginning of the Covid-19 pandemic, the World Health Organization has detected a dramatic increase in the number of cyber-attacks. For instance, in Italy the COVID-19 emergency has heavily affected cybersecurity; from January to April 2020, the total of attacks, accidents, and violations of privacy to the detriment of companies and individuals has doubled. Using a systematic and rigorous approach, this paper aims to analyze the literature on the cyber risk in the healthcare sector to understand the real knowledge on this topic. The findings highlight the poor attention of the scientific community on this topic, except in the United States. The literature lacks research contributions to support cyber risk management in subject areas such as Business, Management and Accounting; Social Science; and Mathematics. This research outlines the need to empirically investigate the cyber risk, giving a practical solution to health facilities.
引用
收藏
页数:16
相关论文
共 102 条
  • [1] Towards a maturity model for health-care cloud security (M2HCS)
    Akinsanya, Opeoluwa Ore
    Papadaki, Maria
    Sun, Lingfen
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (03) : 321 - 345
  • [2] Threat Modeling for Electronic Health Record Systems
    Almulhem, Ahmad
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (05) : 2921 - 2926
  • [3] Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [4] Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?
    Anderson, Scott
    Williams, Trish
    [J]. COMPUTER STANDARDS & INTERFACES, 2018, 56 : 134 - 143
  • [5] [Anonymous], 2012, CROSS TALK
  • [6] Insurability of Cyber Risk: An Empirical Analysis
    Biener, Christian
    Eling, Martin
    Wirfs, Jan Hendrik
    [J]. GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2015, 40 (01) : 131 - 158
  • [7] Blanke Sandra J, 2016, J Healthc Risk Manag, V36, P14, DOI 10.1002/jhrm.21230
  • [8] Bohme R., 2006, WEIS, P2
  • [9] Risk analysis of information security in a mobile instant messaging and presence system for healthcare
    Bones, Erlend
    Hasuold, Per
    Henriksen, Eua
    Strandences, Thomas
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (09) : 677 - 687
  • [10] Briggs Bill, 2003, Health Data Manag, V11, P38