Suche

Wo soll gesucht werden?
Erweiterte Literatursuche

Ariadne Pfad:

Inhalt

Literaturnachweis - Detailanzeige

 
Autor/inn/enMawel, Maurice; Sambasivam, Samuel
TitelExploring the Strategic Cybersecurity Defense Information Technology Managers Should Implement to Reduce Healthcare Data Breaches
QuelleIn: Information Systems Education Journal, 21 (2023) 3, S.4-11 (8 Seiten)
PDF als Volltext kostenfreie Datei Verfügbarkeit 
Spracheenglisch
Dokumenttypgedruckt; online; Zeitschriftenaufsatz
SchlagwörterInformation Security; Information Technology; Confidential Records; Health Services; Leadership Responsibility; Administrator Qualifications; Allied Health Personnel; Computer Use; Data Use; Incidence; Training; Computer Security; Information Storage; Risk
AbstractThe principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare, and IT Managers' lack of leadership competence. Also, various annotations from contextual, seminal, grey, and recent literature were used to find the research problem: The strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches has not been established. The PI collected secondary data from the Office of Civil Rights (OCR)/Department of Health and Human Services (HHS). The analysis, results, and findings are provided below in Part 9. Nevertheless, the routine interaction during health information exchange (HIE) on an interoperable network and the behavior of care providers and third parties who use computers and mobile devices to exchange patient data is an opportunity for cybercriminals to install malware or launch a ransomware attack to exploit potential vulnerabilities whether to steal sensitive data or compromise the network systems. Therefore, strategic cyber defense or an innovative security model would mitigate the threat. An exploratory design is used, and an epistemological approach supports the research method and design. The study is significant, and it will contribute to the body of knowledge the PI suggested for future research and provide major recommendations. (As Provided).
AnmerkungenInformation Systems and Computing Academic Professionals. Box 488, Wrightsville Beach, NC 28480. e-mail: publisher@isedj.org; Web site: http://isedj.org
Erfasst vonERIC (Education Resources Information Center), Washington, DC
Update2024/1/01
Literaturbeschaffung und Bestandsnachweise in Bibliotheken prüfen
 

Standortunabhängige Dienste

Tipps zum Auffinden elektronischer Volltexte im Video-Tutorial

Trefferlisten Einstellungen

Permalink als QR-Code

Permalink als QR-Code

Inhalt auf sozialen Plattformen teilen (nur vorhanden, wenn Javascript eingeschaltet ist)

Teile diese Seite: