Chapter 2 | Information Systems homework help

[ad_1]

1
DSRT 736
Healthcare’s Vulnerability to Ransomware Attacks

Research question: To what extent is the healthcare system vulnerable to ransomware attacks?

References

Agale, N. (2020). Healthcare challenge: protecting patient data privacy during a global pandemic. British Journal of Healthcare Assistants, 14(9), 434–437. https://doi.org/10.12968/bjha.2020.14.9.434

Ahmed, Y., Naqvi, S., & Josephs, M. (2019, May). Cybersecurity metrics for enhanced protection of healthcare IT systems. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-9). IEEE. https://doi.org/10.1109/ISMICT.2019.8744003

Ahmed, M., & Ullah, A. S. B. (2017, August). False data injection attacks in healthcare. In Australasian Conference on Data Mining (pp. 192-202). Springer, Singapore. https://doi.org/10.1007/978-981-13-0292-3_12

Ahmadian MM, Shahriari HR (2016) 2entFOX: a framework for high survivable ransomwares detection. In: 13th International ISC conference on information security and cryptology, ISCISC 2016, pp 79–84. https://doi.org/10.1109/ISCISC.2016.7736455

Attaran, M. (2020). Blockchain technology in healthcare: Challenges and opportunities. International Journal of Healthcare Management, 1-14. https://doi.org/10.1080/20479700.2020.1843887

Ayala, L. (2016). Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention. Apress L. P. https://doi.org/10.1007/978-1-4842-2155-6

Beavers, J., & Pournouri, S. (2019). Recent cyber attacks and vulnerabilities in medical devices and healthcare institutions. In Blockchain and Clinical Trial (pp. 249-267). Springer, Cham.
https://doi.org/10.1007/978-3-030-11289-9_11

Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., … & Dobalian, A. (2020). Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. Journal of medical systems, 44(5), 1-9.
https://doi.org/10.1007/s10916-019-1507-y

Branch, L. E., Eller, W. S., Bias, T. K., McCawley, M. A., Myers, D. J., Gerber, B. J., & Bassler, J. R. (2019). Trends in Malware Attacks against United States Healthcare Organizations, 2016-2017. Global Biosecurity, 1(1), 15–27. https://doi.org/10.31646/gbio.7

Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5–9. https://doi.org/10.1016/S1353-4858(16)30086-1

Collier, R. (2017). NHS ransomware attack spreads worldwide. Canadian Medical Association Journal (CMAJ), 189(22), E786–E787. https://doi.org/10.1503/cmaj.1095434

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas, 113, 48-52. https://doi.org/10.1016/j.maturitas.2018.04.008

Celdrán, A. H., Clemente, F. J. G., & Perez, G. M. (2020). Toward the Detection and Mitigation of Ransomware Attacks in Medical Cyber-Physical Systems (MCPSs). Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 91. https://doi.org/10.1201/9780429270567-4

Chacko, A., & Hayajneh, T. (2018). Security and privacy issues with IoT in healthcare. EAI Endorsed Transactions on Pervasive Health and Technology, 4(14).
https://doi.org/10.4108/eai.13-7-2018.155079

Chung, M. (2019). Why employees matter in the fight against ransomware. Computer Fraud & Security, 2019(8), 8-11. https://doi.org/10.1016/S1361-3723(19)30084-3

Fernández Maimó, L., Huertas Celdrán, A., Perales Gómez, Á. L., García Clemente, F. J., Weimer, J., & Lee, I. (2019). Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments. Sensors (Basel, Switzerland), 19(5), 1114–. https://doi.org/10.3390/s19051114

Gagneja, K. K. (2017, February). Knowing the ransomware and building defense against it-specific to healthcare institutes. In 2017 Third International Conference on Mobile and Secure Services (MobiSecServ) (pp. 1-5). IEEE. https://doi.org/10.1109/MOBISECSERV.2017.7886569

Grimes, S., & Wirth, A. (2017). Holding the Line: Events that Shaped Healthcare Cybersecurity. Biomedical Instrumentation & Technology, 51(s6), 30–32. https://doi.org/10.2345/0899-8205-51.s6.30

Hassan, N. U. (2018). Ransomware attack on Medstar: Ethical position statement. SEISENSE Journal of Management, 1(4), 29-31. https://doi.org/10.1007/978-1-4842-4255-1_2

Ibarra, J., Jahankhani, H., & Kendzierskyj, S. (2019). Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime. In Blockchain and Clinical Trial (pp. 115–137). Springer International Publishing. https://doi.org/10.1007/978-3-030-11289-9_5

Jarrett, M. P. (2017). Cybersecurity—A Serious Patient Care Concern. JAMA : the Journal of the American Medical Association, 318(14), 1319–1320. https://doi.org/10.1001/jama.2017.11986

Jensen, R. D., Copeland, S., Domas, S., Hampton, R., Hoyme, K., Jump, M., Rekik, I., Schwartz, S., & Vasserman, E. (2017). A Roundtable Discussion: Thawing Out Healthcare Technology’s “Special Snowflake” Cybersecurity Challenges. Biomedical Instrumentation & Technology, 51(s6), 10–16. https://doi.org/10.2345/0899-8205-51.s6.10

Kelpsas, B., & Nelson, A. (2016). Ransomware in hospitals: What providers will inevitably face when attacked. The Journal of Medical Practice Management: MPM, 32(1), 67-70. https://doi.org/10.1016/S1353-4858(16)30031-9

Kim, L. (2020). Cybercrime, ransomware, and the informatics nurse. Nursing Management, 51(5), 10–12. https://doi.org/10.1097/01.NUMA.0000659448.63050.f1

Kharraz, A., Robertson, W., & Kirda, E. (2018). Protecting against ransomware: A new line of research or restating classic ideas?. IEEE Security & Privacy, 16(3), 103-107. https://doi.org/10.1109/MSP.2018.2701165

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1–10. https://doi.org/10.3233/THC-161263

Loi, M., Christen, M., Kleine, N., & Weber, K. (1C.E.). Cybersecurity in health – disentangling value tensions. Journal of Information, Communication & Ethics in Society (Online), 17(2), 229–245. https://doi.org/10.1108/JICES-12-2018-0095

Maigida, A. M., Olalere, M., Alhassan, J. K., Chiroma, H., & Dada, E. G. (2019). Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. Journal of Reliable Intelligent Environments, 5(2), 67-89. https://doi.org/10.1007/s40860-019-00080-3

Mansfield-Devine, S. (2017). Leaks and ransoms-the key threats to healthcare organisations. Network Security, 2017(6), 14-19. https://doi.org/10.1016/S1353-4858(17)30062-4

Major ransomware campaign targets healthcare facilities in US. (2020). Computer Fraud & Security, 2020(11), 1,3–1,3. https://doi.org/10.1016/S1361-3723(20)30112-3

Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019, October). CUREX: seCUre and pRivate hEalth data eXchange. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume (pp. 263-268).
https://doi.org/10.1145/3358695.3361753

O’Brien, N., Grass, E., Martin, G., Durkin, M., Darzi, A., & Ghafur, S. (2021). Developing a globally applicable cybersecurity framework for healthcare: a Delphi consensus study. BMJ Innovations, 7(1), 199–207. https://doi.org/10.1136/bmjinnov-2020-000572

Offner, K. L., Sitnikova, E., Joiner, K., & MacIntyre, C. R. (2020). Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security, 35(4), 556–585. https://doi.org/10.1080/02684527.2020.1752459

Owens, B. (2020). How hospitals can protect themselves from cyber attack. Canadian Medical Association Journal (CMAJ), 192(4), E101–E102. https://doi.org/10.1503/cmaj.1095841

Papastergiou, S., Mouratidis, H., & Kalogeraki, E. M. (2021). Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evolving Systems, 12(1), 91-108. https://doi.org/10.1007/s12530-020-09335-4
Priestman, W., Anstis, T., Sebire, I. G., Sridharan, S., & Sebire, N. J. (2019). Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ health & care informatics, 26(1). https://doi.org/10.1136/bmjhci-2019-100031
Ransomware claims first fatality as healthcare under renewed assault. (2020). Computer Fraud & Security, 2020(10), 1,3–1,3. https://doi.org/10.1016/S1361-3723(20)30101-9

Raina MacIntyre, C., Engells, T. E., Scotch, M., Heslop, D. J., Gumel, A. B., Poste, G., Chen, X., Herche, W., Steinhöfel, K., Lim, S., & Broom, A. (2018). Converging and emerging threats to health security. Environment Systems & Decisions, 38(2), 198–207. https://doi.org/10.1007/s10669-017-9667-0

Rehman, H. ur, Yafi, E., Nazir, M., & Mustafa, K. (2018). Security Assurance Against Cybercrime Ransomware. In Intelligent Computing & Optimization (pp. 21–34). Springer International Publishing. https://doi.org/10.1007/978-3-030-00979-3_3

Ronquillo, J. G., Erik Winterholler, J., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open, 1(1), 15–19. https://doi.org/10.1093/jamiaopen/ooy019

Safavi, S., Meer, A. M., Melanie, E. K. J., & Shukur, Z. (2018, November). Cyber vulnerabilities on smart healthcare, review and solutions. In 2018 Cyber Resilience Conference (CRC) (pp. 1-5). IEEE. https://doi.org/10.1109/CR.2018.8626826
Selvaganapathy, S., & Sadasivam, S. (2020, September). Malware Attacks on Electronic Health Records. In Congress on Intelligent Systems (pp. 589-599). Springer, Singapore.
https://doi.org/10.1007/978-981-33-6981-8_47

Sipior, J. C., Bierstaker, J., Borchardt, P., & Ward, B. T. (2018). A Ransomware Case for Use in the Classroom. Communications of the Association for Information Systems, 43, 598–614. https://doi.org/10.17705/1CAIS.04332

Slayton, T. B. (2018). Ransomware: The Virus Attacking the Healthcare Industry. The Journal of Legal Medicine (Chicago. 1979), 38(2), 287–311. https://doi.org/10.1080/01947648.2018.1473186

Stanciu, V., & Tinca, A. (2017). Exploring cybercrime – realities and challenges. Journal of Accounting and Management Information Systems, 16(4), 610–632. https://doi.org/10.24818/jamis.2017.04009

Topinka, J. B. (2018). Keeping Up with Today’s Top Health Law Issues to Avoid a “Nasty Surprise.” Frontiers of Health Services Management, 34(4), 3–11. https://doi.org/10.1097/HAP.0000000000000031

Trautman, L. J., & Ormerod, P. C. (2018). Wannacry, ransomware, and the emerging threat to corporations. Tenn. L. Rev., 86, 503. https://doi.org/10.2139/ssrn.3238293
Wang, Z., Liu, C., Qiu, J., Tian, Z., Cui, X., & Su, S. (2018). Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wireless Communications and Mobile Computing, 2018, 1–13. https://doi.org/10.1155/2018/7943586

Yao, W., Chu, C.-H., & Li, Z. (2010). The use of RFID in healthcare: Benefits and barriers. 2010 IEEE International Conference on RFID-Technology and Applications. https://doi.org/10.1109/RFID-TA.2010.5529874

Zhao, J. Y., Kessler, E. G., Yu, J., Jalal, K., Cooper, C. A., Brewer, J. J., Schwaitzberg, S. D., & Guo, W. A. (2018). Impact of Trauma Hospital Ransomware Attack on Surgical Residency Training. The Journal of Surgical Research, 232, 389–397. https://doi.org/10.1016/j.jss.2018.06.072

[ad_2]

Homework helper

Leave a Comment

Your email address will not be published.