메뉴 건너뛰기




Volumn 25, Issue 1, 2017, Pages 1-10

Cybersecurity in healthcare: A systematic review of modern threats and trends

Author keywords

Cyber attack; Cyber threats; Cybercrime; Cybersecurity; Health; Healthcare; Ransomware

Indexed keywords

ACCESS TO INFORMATION; CLOUD COMPUTING; CYBERSECURITY; FUNDING; HEALTH CARE INDUSTRY; HEALTH CARE SYSTEM; INFORMATION TECHNOLOGY; INVESTMENT; MEDICAL INFORMATION; PATIENT INFORMATION; PRIORITY JOURNAL; REVIEW; SOFTWARE; COMPUTER SECURITY; CONFIDENTIALITY; CRIME; HEALTH CARE DELIVERY; HEALTH INSURANCE; HUMAN; ORGANIZATION AND MANAGEMENT; STANDARDS; UNITED STATES;

EID: 85014124347     PISSN: 09287329     EISSN: None     Source Type: Journal    
DOI: 10.3233/THC-161263     Document Type: Review
Times cited : (250)

References (38)
  • 1
    • 85014069013 scopus 로고    scopus 로고
    • Centers for Medicare & Medicaid Services [Internet]. Electronic health records (EHR) incentive programs Baltimore, MD: CMS. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation. org/6je8QNlo0)
    • Centers for Medicare & Medicaid Services [Internet]. Electronic health records (EHR) incentive programs Baltimore, MD: CMS; 2016. URL:https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/index.html?redirect=/ehrincentiveprograms. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation. org/6je8QNlo0).
    • (2016)
  • 2
    • 85014066973 scopus 로고    scopus 로고
    • CW Jobs [Internet]. London, UK: 2016. Cyber crime timeline; URL:http://www.cwjobs.co.uk/careers-advice/itglossary/cyber-crime-timeline. Accessed: 2016-08-09. (Archived by WebCite R- at
    • CW Jobs [Internet]. London, UK: 2016. Cyber crime timeline; URL:http://www.cwjobs.co.uk/careers-advice/itglossary/cyber-crime-timeline. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8V9 cyI).
  • 3
    • 85014102662 scopus 로고    scopus 로고
    • U.S. Department of Health and Human Services. Security standards: technical safeguards [Internet]. Baltimore, MD: CMS; URL:. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8cfMpZ)
    • U.S. Department of Health and Human Services. Security standards: technical safeguards [Internet]. Baltimore, MD: CMS; URL:http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcitation.org/6je8cfMpZ).
  • 4
    • 85014119057 scopus 로고    scopus 로고
    • U.S. Department of Health and Human Services. Fact sheet: ransomware and HIPAA [Internet]. Baltimore, MD: CMS;. Accessed: 2016-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je8iBYI5)
    • U.S. Department of Health and Human Services. Fact sheet: ransomware and HIPAA [Internet]. Baltimore, MD: CMS; URL:http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf. Accessed: 2016-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je8iBYI5).
  • 5
    • 85014115692 scopus 로고    scopus 로고
    • AHC Media LLC. Hackers target hospitals with ransomware. ED LEGAL LETT. 2016 Apr; 27(4): 1-4
    • AHC Media LLC. Hackers target hospitals with ransomware. ED LEGAL LETT. 2016 Apr; 27(4): 1-4.
  • 7
    • 84957884477 scopus 로고    scopus 로고
    • Cyber threats to health information systems: A systematic review
    • Jan 27
    • Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technol Health Care. 2016 Jan 27;24(1): 1-9. Available from: 10.3233/THC-151102.
    • (2016) Technol Health Care. , vol.24 , Issue.1 , pp. 1-9
    • Luna, R.1    Rhine, E.2    Myhra, M.3    Sullivan, R.4    Kruse, C.S.5
  • 8
    • 85014113476 scopus 로고    scopus 로고
    • Ransomware attacks are on the rise, and hackers are getting better
    • May
    • AHC Media LLC. Ransomware attacks are on the rise, and hackers are getting better. ED LEGAL LETT. 2016 May; 1(4): 1-4.
    • (2016) ED LEGAL LETT. , vol.1 , Issue.4 , pp. 1-4
  • 9
    • 84988838453 scopus 로고    scopus 로고
    • Cybersecurity for medical device manufacturers: Ensuring safety and functionality
    • Jan 20
    • Wu F, Eagles S. Cybersecurity for medical device manufacturers: Ensuring safety and functionality. Biomed Instrum Technol. 2016 Jan 20; 50(1): 23-33. Available from: 10.2345/0899-8205-50.1.23.
    • (2016) Biomed Instrum Technol. , vol.50 , Issue.1 , pp. 23-33
    • Wu, F.1    Eagles, S.2
  • 10
    • 85014106615 scopus 로고    scopus 로고
    • HCPro.com Ransomware a new threat to healthcare sector. Physician Practice Perspective. May 2016; 11-12
    • HCPro.com Ransomware a new threat to healthcare sector. Physician Practice Perspective. May 2016; 11-12.
  • 11
    • 85014118477 scopus 로고    scopus 로고
    • Modern Healthcare. URL:. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcita tion.org/6jdtejLCt) April 16
    • Conn J. Federal task force takes on healthcare cybersecurity. Modern Healthcare. URL:http://www.modernhealthcare. com/article/20160416/MAGAZINE/304169890. Accessed: 2016-08-09. (Archived by WebCite R- at http://www.webcita tion.org/6jdtejLCt) April 16, 2016.
    • (2016) Federal Task Force Takes on Healthcare Cybersecurity
    • Conn, J.1
  • 12
    • 85014062634 scopus 로고    scopus 로고
    • Healthcare IT transformation: How has ransomware shifted the landscape of healthcare data security?
    • May
    • Rowe K. Healthcare IT transformation: how has ransomware shifted the landscape of healthcare data security? Healthc Inform. 2016 May; 33(3): 44-45.
    • (2016) Healthc Inform. , vol.33 , Issue.3 , pp. 44-45
    • Rowe, K.1
  • 13
    • 85014114888 scopus 로고    scopus 로고
    • When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist
    • Jul
    • Blanke SJ, McGrady E. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: a cybersecurity risk assessment checklist. J Healthc Risk Manag. 2016 Jul; 36(1): 14-24. Available from: 10.1002/jhrm.21230.
    • (2016) J Healthc Risk Manag. , vol.36 , Issue.1 , pp. 14-24
    • Blanke, S.J.1    McGrady, E.2
  • 14
    • 85014081068 scopus 로고    scopus 로고
    • With the ransomware crisis, the landscape of data security shifts in healthcare
    • May
    • Hagland M. With the ransomware crisis, the landscape of data security shifts in healthcare. Healthc Inform. 2016 May; 33(3): 41-47.
    • (2016) Healthc Inform. , vol.33 , Issue.3 , pp. 41-47
    • Hagland, M.1
  • 15
    • 85014124113 scopus 로고    scopus 로고
    • Healthcare increasingly targeted by ransomware attacks
    • American Health Information Management Association
    • American Health Information Management Association. Healthcare increasingly targeted by ransomware attacks. J AHIMA. 2016 May; 87(5): 12.
    • (2016) J AHIMA. , vol.87 , Issue.5 , pp. 12
  • 17
    • 85014107380 scopus 로고    scopus 로고
    • Ransomware poses major threat to hospitals
    • American Association of Critical-Care Nurses Jun
    • American Association of Critical-Care Nurses. Ransomware poses major threat to hospitals. AACN BOLD VOICES. 2016 Jun; 8(6): 14.
    • (2016) AACN BOLD VOICES. , vol.8 , Issue.6 , pp. 14
  • 20
    • 85014106148 scopus 로고    scopus 로고
    • Security: The ransomware nightmare
    • Apr
    • Goedert J. Security: the ransomware nightmare. HEALTH DATA MANAGE. 2016 Apr; 24(3): 10.
    • (2016) HEALTH DATA MANAGE. , vol.24 , Issue.3 , pp. 10
    • Goedert, J.1
  • 21
    • 84989768787 scopus 로고    scopus 로고
    • Ransomware scare: Will hospitals pay for protection?
    • Apr 11
    • Conn J. Ransomware scare: Will hospitals pay for protection? Modern Healthcare. 2016 Apr 11; 46(15): 8.
    • (2016) Modern Healthcare. , vol.46 , Issue.15 , pp. 8
    • Conn, J.1
  • 22
    • 85014114186 scopus 로고    scopus 로고
    • Hospitals become major target for ransomware
    • Hospitals become major target for ransomware. Network Security 2016 4; 2016 (4): 1-2.
    • (2016) Network Security , vol.4 , Issue.4 , pp. 1-2
  • 23
    • 85014122428 scopus 로고    scopus 로고
    • Ransomware attacks pose growing threat
    • May 1
    • Tuttle H. Ransomware Attacks Pose Growing Threat. Risk Management. 2016 May 1; 63(4): 4.
    • (2016) Risk Management. , vol.63 , Issue.4 , pp. 4
    • Tuttle, H.1
  • 24
    • 85014122803 scopus 로고    scopus 로고
    • What to do after a ransomware attack
    • Jun 1
    • Valach AP. What to Do After a Ransomware Attack. Risk Management. 2016 Jun 1; 63(5): 12.
    • (2016) Risk Management. , vol.63 , Issue.5 , pp. 12
    • Valach, A.P.1
  • 25
    • 84924808471 scopus 로고    scopus 로고
    • Workarounds to computer access in healthcare organizations: You want my password or a dead patient?
    • Koppel R, Smith S, Blythe J, Kothari V. Workarounds to computer access in healthcare organizations: you want my password or a dead patient? Stud Health Technol Inform. 2015; 208: 215-220. Available from: 10.3233/978-1-61499-488-6-215.
    • (2015) Stud Health Technol Inform. , vol.208 , pp. 215-220
    • Koppel, R.1    Smith, S.2    Blythe, J.3    Kothari, V.4
  • 27
    • 84930014417 scopus 로고    scopus 로고
    • Cybersecurity expert: Medical devices have 'a long way to go'
    • May 20
    • Rios B. Cybersecurity expert: medical devices have 'a long way to go'. Biomed Instrum Technol. 2015 May 20; 49(3): 197-200. Available from: 10.2345/0899-8205-49.3.197.
    • (2015) Biomed Instrum Technol. , vol.49 , Issue.3 , pp. 197-200
    • Rios, B.1
  • 29
    • 84946752664 scopus 로고    scopus 로고
    • Five things providers need to know about cybersecurity
    • Welch SS. Five things providers need to know about cybersecurity. Journal of the Medical Association of Georgia. 2015; 104(1): 40-2.
    • (2015) Journal of the Medical Association of Georgia. , vol.104 , Issue.1 , pp. 40-42
    • Welch, S.S.1
  • 30
    • 85014078119 scopus 로고    scopus 로고
    • Ransomeware: Tales from the cryptolocker
    • Jun
    • McDermott IE. Ransomeware: Tales from the cryptolocker. Internet Express. Jun 2015: 35-37.
    • (2015) Internet Express , pp. 35-37
    • McDermott, I.E.1
  • 31
    • 84983667699 scopus 로고    scopus 로고
    • TIM lecture series-The expanding cybersecurity threat
    • Mar 1
    • McGuire CF. TIM Lecture Series-The Expanding Cybersecurity Threat. Technology Innovation Management Review. 2015 Mar 1; 5(3): 56.
    • (2015) Technology Innovation Management Review. , vol.5 , Issue.3 , pp. 56
    • McGuire, C.F.1
  • 32
    • 84902590409 scopus 로고    scopus 로고
    • Healthcare cybersecurity risk management: Keys to an effective plan
    • Coronado AJ,Wong TL. Healthcare cybersecurity risk management: keys to an effective plan. Biomed Instrum Technol. 2014;(Suppl): 26-30. Available from: 10.2345/0899-8205-48.s1.26.
    • (2014) Biomed Instrum Technol , pp. 26-30
    • Coronado, A.J.1    Wong, T.L.2
  • 33
    • 84902578385 scopus 로고    scopus 로고
    • A roundtable discussion: Safeguarding information and resources against emerging cybersecurity threats
    • Loughlin S, Fu K, Gee T, Gieras I, Hoyme K, Rajagopalan SR, et al. A roundtable discussion: safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol. 2014; 8-17. Available from: 10.2345/0899-8205-48.s1.8.
    • (2014) Biomed Instrum Technol , pp. 8-17
    • Loughlin, S.1    Fu, K.2    Gee, T.3    Gieras, I.4    Hoyme, K.5    Rajagopalan, S.R.6
  • 34
    • 85014121741 scopus 로고    scopus 로고
    • New Ransomware and Cyber extortion Schemes Hold Businesses Hostage
    • Oct 1
    • Bangs G. New Ransomware and Cyber extortion Schemes Hold Businesses Hostage. Risk Management. 2014 Oct 1; 61(8): 30.
    • (2014) Risk Management. , vol.61 , Issue.8 , pp. 30
    • Bangs, G.1
  • 35
    • 84885719603 scopus 로고    scopus 로고
    • Controlling for cybersecurity risks of medical device software
    • Oct
    • Fu K, Blum J. Controlling for cybersecurity risks of medical device software. Commun ACM. 2013 Oct; 56(10): 35-37. Available from: 10.1145/2508701.
    • (2013) Commun ACM. , vol.56 , Issue.10 , pp. 35-37
    • Fu, K.1    Blum, J.2
  • 36
    • 77952142827 scopus 로고    scopus 로고
    • Awareness education as the key to ransomware prevention
    • Jul
    • Luo X, Liao Q. Awareness education as the key to ransomware prevention. Information Systems Security. 2007 Jul; 16(4): 195-202. Available from: 10.1080/10658980701576412.
    • (2007) Information Systems Security. , vol.16 , Issue.4 , pp. 195-202
    • Luo, X.1    Liao, Q.2
  • 37
    • 33748599844 scopus 로고    scopus 로고
    • Webjacking, and how to boot it out
    • Aug 31
    • Mueller L. Webjacking, and how to boot it out. Network Security. 2006 Aug 31; (8): 15-8.
    • (2006) Network Security. , Issue.8 , pp. 15-18
    • Mueller, L.1
  • 38
    • 85014073121 scopus 로고    scopus 로고
    • Health Resources and Services Administration. Baltimore, MD: HHS; 2016. What is meaningful use?; URL:. Accessed: 201 6-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je785Ed5)
    • Health Resources and Services Administration. Baltimore, MD: HHS; 2016. What is meaningful use?; URL:http://www.hrsa.gov/healthit/meaningfuluse/MU%20Stage1%20CQM/whatis.html. Accessed: 201 6-08-09. (Archived byWeb Cite R- at http://www.webcitation.org/6je785Ed5)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.