Chapter 2 | Information Systems homework help


DSRT 736
Healthcare’s Vulnerability to Ransomware Attacks

Research question: To what extent is the healthcare system vulnerable to ransomware attacks?


Agale, N. (2020). Healthcare challenge: protecting patient data privacy during a global pandemic. British Journal of Healthcare Assistants, 14(9), 434–437.

Ahmed, Y., Naqvi, S., & Josephs, M. (2019, May). Cybersecurity metrics for enhanced protection of healthcare IT systems. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-9). IEEE.

Ahmed, M., & Ullah, A. S. B. (2017, August). False data injection attacks in healthcare. In Australasian Conference on Data Mining (pp. 192-202). Springer, Singapore.

Ahmadian MM, Shahriari HR (2016) 2entFOX: a framework for high survivable ransomwares detection. In: 13th International ISC conference on information security and cryptology, ISCISC 2016, pp 79–84.

Attaran, M. (2020). Blockchain technology in healthcare: Challenges and opportunities. International Journal of Healthcare Management, 1-14.

Ayala, L. (2016). Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention. Apress L. P.

Beavers, J., & Pournouri, S. (2019). Recent cyber attacks and vulnerabilities in medical devices and healthcare institutions. In Blockchain and Clinical Trial (pp. 249-267). Springer, Cham.

Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., … & Dobalian, A. (2020). Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. Journal of medical systems, 44(5), 1-9.

Branch, L. E., Eller, W. S., Bias, T. K., McCawley, M. A., Myers, D. J., Gerber, B. J., & Bassler, J. R. (2019). Trends in Malware Attacks against United States Healthcare Organizations, 2016-2017. Global Biosecurity, 1(1), 15–27.

Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5–9.

Collier, R. (2017). NHS ransomware attack spreads worldwide. Canadian Medical Association Journal (CMAJ), 189(22), E786–E787.

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas, 113, 48-52.

Celdrán, A. H., Clemente, F. J. G., & Perez, G. M. (2020). Toward the Detection and Mitigation of Ransomware Attacks in Medical Cyber-Physical Systems (MCPSs). Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 91.

Chacko, A., & Hayajneh, T. (2018). Security and privacy issues with IoT in healthcare. EAI Endorsed Transactions on Pervasive Health and Technology, 4(14).

Chung, M. (2019). Why employees matter in the fight against ransomware. Computer Fraud & Security, 2019(8), 8-11.

Fernández Maimó, L., Huertas Celdrán, A., Perales Gómez, Á. L., García Clemente, F. J., Weimer, J., & Lee, I. (2019). Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments. Sensors (Basel, Switzerland), 19(5), 1114–.

Gagneja, K. K. (2017, February). Knowing the ransomware and building defense against it-specific to healthcare institutes. In 2017 Third International Conference on Mobile and Secure Services (MobiSecServ) (pp. 1-5). IEEE.

Grimes, S., & Wirth, A. (2017). Holding the Line: Events that Shaped Healthcare Cybersecurity. Biomedical Instrumentation & Technology, 51(s6), 30–32.

Hassan, N. U. (2018). Ransomware attack on Medstar: Ethical position statement. SEISENSE Journal of Management, 1(4), 29-31.

Ibarra, J., Jahankhani, H., & Kendzierskyj, S. (2019). Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime. In Blockchain and Clinical Trial (pp. 115–137). Springer International Publishing.

Jarrett, M. P. (2017). Cybersecurity—A Serious Patient Care Concern. JAMA : the Journal of the American Medical Association, 318(14), 1319–1320.

Jensen, R. D., Copeland, S., Domas, S., Hampton, R., Hoyme, K., Jump, M., Rekik, I., Schwartz, S., & Vasserman, E. (2017). A Roundtable Discussion: Thawing Out Healthcare Technology’s “Special Snowflake” Cybersecurity Challenges. Biomedical Instrumentation & Technology, 51(s6), 10–16.

Kelpsas, B., & Nelson, A. (2016). Ransomware in hospitals: What providers will inevitably face when attacked. The Journal of Medical Practice Management: MPM, 32(1), 67-70.

Kim, L. (2020). Cybercrime, ransomware, and the informatics nurse. Nursing Management, 51(5), 10–12.

Kharraz, A., Robertson, W., & Kirda, E. (2018). Protecting against ransomware: A new line of research or restating classic ideas?. IEEE Security & Privacy, 16(3), 103-107.

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1–10.

Loi, M., Christen, M., Kleine, N., & Weber, K. (1C.E.). Cybersecurity in health – disentangling value tensions. Journal of Information, Communication & Ethics in Society (Online), 17(2), 229–245.

Maigida, A. M., Olalere, M., Alhassan, J. K., Chiroma, H., & Dada, E. G. (2019). Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. Journal of Reliable Intelligent Environments, 5(2), 67-89.

Mansfield-Devine, S. (2017). Leaks and ransoms-the key threats to healthcare organisations. Network Security, 2017(6), 14-19.

Major ransomware campaign targets healthcare facilities in US. (2020). Computer Fraud & Security, 2020(11), 1,3–1,3.

Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019, October). CUREX: seCUre and pRivate hEalth data eXchange. In IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume (pp. 263-268).

O’Brien, N., Grass, E., Martin, G., Durkin, M., Darzi, A., & Ghafur, S. (2021). Developing a globally applicable cybersecurity framework for healthcare: a Delphi consensus study. BMJ Innovations, 7(1), 199–207.

Offner, K. L., Sitnikova, E., Joiner, K., & MacIntyre, C. R. (2020). Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intelligence and National Security, 35(4), 556–585.

Owens, B. (2020). How hospitals can protect themselves from cyber attack. Canadian Medical Association Journal (CMAJ), 192(4), E101–E102.

Papastergiou, S., Mouratidis, H., & Kalogeraki, E. M. (2021). Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evolving Systems, 12(1), 91-108.
Priestman, W., Anstis, T., Sebire, I. G., Sridharan, S., & Sebire, N. J. (2019). Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ health & care informatics, 26(1).
Ransomware claims first fatality as healthcare under renewed assault. (2020). Computer Fraud & Security, 2020(10), 1,3–1,3.

Raina MacIntyre, C., Engells, T. E., Scotch, M., Heslop, D. J., Gumel, A. B., Poste, G., Chen, X., Herche, W., Steinhöfel, K., Lim, S., & Broom, A. (2018). Converging and emerging threats to health security. Environment Systems & Decisions, 38(2), 198–207.

Rehman, H. ur, Yafi, E., Nazir, M., & Mustafa, K. (2018). Security Assurance Against Cybercrime Ransomware. In Intelligent Computing & Optimization (pp. 21–34). Springer International Publishing.

Ronquillo, J. G., Erik Winterholler, J., Cwikla, K., Szymanski, R., & Levy, C. (2018). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. JAMIA Open, 1(1), 15–19.

Safavi, S., Meer, A. M., Melanie, E. K. J., & Shukur, Z. (2018, November). Cyber vulnerabilities on smart healthcare, review and solutions. In 2018 Cyber Resilience Conference (CRC) (pp. 1-5). IEEE.
Selvaganapathy, S., & Sadasivam, S. (2020, September). Malware Attacks on Electronic Health Records. In Congress on Intelligent Systems (pp. 589-599). Springer, Singapore.

Sipior, J. C., Bierstaker, J., Borchardt, P., & Ward, B. T. (2018). A Ransomware Case for Use in the Classroom. Communications of the Association for Information Systems, 43, 598–614.

Slayton, T. B. (2018). Ransomware: The Virus Attacking the Healthcare Industry. The Journal of Legal Medicine (Chicago. 1979), 38(2), 287–311.

Stanciu, V., & Tinca, A. (2017). Exploring cybercrime – realities and challenges. Journal of Accounting and Management Information Systems, 16(4), 610–632.

Topinka, J. B. (2018). Keeping Up with Today’s Top Health Law Issues to Avoid a “Nasty Surprise.” Frontiers of Health Services Management, 34(4), 3–11.

Trautman, L. J., & Ormerod, P. C. (2018). Wannacry, ransomware, and the emerging threat to corporations. Tenn. L. Rev., 86, 503.
Wang, Z., Liu, C., Qiu, J., Tian, Z., Cui, X., & Su, S. (2018). Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wireless Communications and Mobile Computing, 2018, 1–13.

Yao, W., Chu, C.-H., & Li, Z. (2010). The use of RFID in healthcare: Benefits and barriers. 2010 IEEE International Conference on RFID-Technology and Applications.

Zhao, J. Y., Kessler, E. G., Yu, J., Jalal, K., Cooper, C. A., Brewer, J. J., Schwaitzberg, S. D., & Guo, W. A. (2018). Impact of Trauma Hospital Ransomware Attack on Surgical Residency Training. The Journal of Surgical Research, 232, 389–397.


Homework helper

Leave a Comment

Your email address will not be published.