Influence of human factors on cyber security within healthcare organisations: A systematic review

S Nifakos, K Chandramouli, CK Nikolaou… - Sensors, 2021 - mdpi.com
Background: Cybersecurity is increasingly becoming a prominent concern among
healthcare providers in adopting digital technologies for improving the quality of care …

GDPR compliant blockchains–a systematic literature review

AKMB Haque, AKMN Islam, S Hyrynsalmi… - Ieee …, 2021 - ieeexplore.ieee.org
Although blockchain-based digital services promise trust, accountability, and transparency,
multiple paradoxes between blockchains and GDPR have been highlighted in the recent …

[HTML][HTML] Stakeholder perspectives and requirements on cybersecurity in Europe

S Fischer-Hübner, C Alcaraz, A Ferreira… - Journal of information …, 2021 - Elsevier
This article presents an overview and analysis of the key cybersecurity problems, challenges
and requirements to be addressed in the future, which we derived through 63 interviews with …

Amanuensis: Information provenance for health-data systems

T Hardin, D Kotz - Information Processing & Management, 2021 - Elsevier
Mobile health (mHealth) apps and devices are increasingly popular for health research,
clinical treatment, and personal wellness, as they offer the ability to continuously monitor …

Automated cyber and privacy risk management toolkit

G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …

Cybersecurity and privacy risk assessment of point-of-care systems in healthcare—a use case approach

M Jofre, D Navarro-Llobet, R Agulló, J Puig… - Applied Sciences, 2021 - mdpi.com
Point-of-care systems are generally used in healthcare to respond rapidly and prevent
critical health conditions. Hence, POC systems often handle personal health information; …

Optimizing investments in cyber hygiene for protecting healthcare users

S Panda, E Panaousis, G Loukas… - From Lambda Calculus to …, 2020 - Springer
Cyber hygiene measures are often recommended for strengthening an organization's
security posture, especially for protecting against social engineering attacks that target the …

A perfect match: Converging and automating privacy and security impact assessment on-the-fly

D Papamartzivanos, SA Menesidou, P Gouvas… - Future Internet, 2021 - mdpi.com
As the upsurge of information and communication technologies has become the foundation
of all modern application domains, fueled by the unprecedented amount of data being …

Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Sco** Review

H Belani, P Šolić, T Perković… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Well-being, aging and health cover important aspects of life of persons, communities and
societies. As a study field, it aims to address all these aspects simultaneously and not …

[HTML][HTML] Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management

AG Pérez, AL Martínez, MG Pérez - Journal of Network and Computer …, 2023 - Elsevier
Over the years, risk management has become increasingly important for all companies,
varying from large, medium-sized to micro-enterprises. The growing increase in cyber …