Does clean energy and technological innovation matter for economic growth? An Asian countries perspective

X He, S Sun, LW Leong, PT Cong… - Economic Analysis and …, 2023 - Elsevier
In recent years, Asian countries have invested heavily in renewable energy technologies as
a means of fulfilling energy demand while reducing carbon emissions. This study focuses on …

An effective self-configurable ransomware prevention technique for IOMT

U Tariq, I Ullah, M Yousuf Uddin, SJ Kwon - Sensors, 2022 - mdpi.com
Remote healthcare systems and applications are being enabled via the Internet of Medical
Things (IoMT), which is an automated system that facilitates the critical and emergency …

A global cybersecurity standardization framework for healthcare informatics

K Gupta, V Mishra, A Makkar - IEEE Journal of Biomedical and …, 2024 - ieeexplore.ieee.org
Healthcare has witnessed an increased digitalization in the post-COVID world.
Technologies such as the medical Internet of Things and wearable devices are generating a …

Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

Improving the Cybersecurity Awareness of Finnish Podiatry SMEs

J Rajamäki, N Chaulagain, M Kukkonen, P Nurmi… - 2023 - theseus.fi
In the health and welfare sector, many entrepreneurs and employees are not skilled in
information and cybersecurity, even when they are constantly dealing with sensitive data …

HEALER2: A Framework for Secure Data Lake Towards Healthcare Digital Transformation Efforts in Low and Middle-Income Countries

PK Yeng, JB Diekuu, M Abomhara… - … on Emerging Trends …, 2023 - ieeexplore.ieee.org
Low and middle-income countries are vigorously digitizing their operations in the healthcare
sector as steps in the digital transformation journey. However, some of the basic principles in …

Exploring Defensive Security Strategies It Leaders Need to Safeguard Their Information Assets in Private Higher Education: A Qualitative Study

S Steelman - 2024 - search.proquest.com
Private higher educational institutions are at a high risk of cyber-attacks based on the
amount of data they consume about students, their families, donors, faculty, and employees …

A qualitative study exploring security practices healthcare providers need to reduce the risk of successful ransomware attacks on electronic health record systems

M Ofe - 2023 - search.proquest.com
The healthcare industry has seen an upsurge in successful ransomware attacks on EHR
systems, posing a serious risk to patient data privacy and confidentiality. The purpose of the …

Healthcare Security Breaches in the United States: Insights and their Socio-Technical Implications

MM Moncy, S Afreen, S Purkayastha - arxiv preprint arxiv:2311.03664, 2023 - arxiv.org
This research examines the pivotal role of human behavior in the realm of healthcare data
management, situated at the confluence of technological advancements and human …

[PDF][PDF] Beyond Technicalities: Assessing Cyber Risk by Incorporating Human Factors

W Huang, S Romanosky, J Uchill - 2024 - weis.utdallas.edu
The process of assessing a firm's cyber risk most often relies on the technical characteristics
of the firm's computing infrastructure, such as network configurations and software patching …