CYBER FRAUD AS A THREAT TO THE SUSTAINABLE DEVELOPMENT OF THE HEALTH CARE SYSTEM: A SYSTEMATIC BIBLIOMETRIC ANALYSIS DOI Open Access
Тетяна Доценко, Михайло Кузьменко

Сталий розвиток економіки, Journal Year: 2023, Volume and Issue: 2(47), P. 50 - 57

Published: Dec. 29, 2023

There is a growing wave of cyber fraud in the healthcare industry. Cases breaches confidentiality and security, leakage, theft breach medical confidential data, fraudsters gaining access to machines networks institutions have become more frequent. The main purpose study retrospective current systematic bibliometric analysis scientific research field as threat sustainable development health care system based on Scopus, VOS Viewer, Statista. relevance solving this problem lies conducting not traditional, but comprehensive innovative industry, identifying priority dynamic, geographical inter-sectoral links directions, problematic aspects. was carried out following logical sequence: determining criteria for selecting publications system; dynamics articles area; analyzing distribution research; studying subject areas under study; forming clusters by key terms; building an evolutionary temporal map relationships studied categories with other concepts dynamics. Scopus platform, Viewer software, Statista statistical database were used analytical tools study. theoretically proves existence close relationship between fraud. results proposed model industry will allow timely identification aspects terms cybersecurity, improve protection patients, patient hospital security management, strengthen devices, minimize risks losses system, organize ensure good people.

Language: Английский

Blockchain technologies adoption in healthcare: Overcoming barriers amid the hype cycle to enhance patient care DOI Creative Commons
Usharani Hareesh Govindarajan, Gagan Narang, Dhiraj K. Singh

et al.

Technological Forecasting and Social Change, Journal Year: 2025, Volume and Issue: 213, P. 124031 - 124031

Published: Feb. 12, 2025

Language: Английский

Citations

1

Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data DOI Creative Commons
Morteza SaberiKamarposhti,

Kok-Why Ng,

Fang-Fang Chua

et al.

Heliyon, Journal Year: 2024, Volume and Issue: 10(10), P. e31406 - e31406

Published: May 1, 2024

As healthcare systems transition into an era dominated by quantum technologies, the need to fortify cybersecurity measures protect sensitive medical data becomes increasingly imperative. This paper navigates intricate landscape of post-quantum cryptographic approaches and emerging threats specific sector. Delving encryption protocols such as lattice-based, code-based, hash-based, multivariate polynomial cryptography, addresses challenges in adoption compatibility within systems. The exploration potential posed attacks vulnerabilities existing standards underscores urgency a change basic assumptions security. provides detailed roadmap for implementing solutions, considering unique faced organizations, including integration issues, budget constraints, specialized training. Finally, abstract concludes with emphasis on importance timely strategies ensure resilience face evolving threats. not only offers practical insights securing but also serves guide future directions dynamic cybersecurity.

Language: Английский

Citations

5

Tools of Emancipation as Global Web and its Digital Ecosystem DOI
Bhupinder Singh, Christian Kaunert

Published: Feb. 25, 2025

Language: Английский

Citations

0

Evaluating password security compliance in a Phuket private hospital: A UTAUT-based analysis DOI
Pita Jarupunphol,

Suksai Siwatchaya,

Wipawan Buathong

et al.

Multidisciplinary Reviews, Journal Year: 2025, Volume and Issue: 8(7), P. 2025195 - 2025195

Published: Feb. 5, 2025

The study presented focuses on evaluating password security compliance within a private hospital in Phuket, employing the Unified Theory of Acceptance and Use Technology (UTAUT) framework. Descriptive statistics reveal that 416 healthcare professionals participated survey, with 55% female. Age analysis showed nearly half (48.6%) participants were under 30, 85.3% held bachelor's degree. Most respondents adhered to recommended practices, including using passwords 8-10 characters incorporating numbers, uppercase letters, special characters. However, significant vulnerability was observed as 83.41% used same across multiple accounts. Statistical Structural Equation Modeling (SEM) indicated performance expectancy (PE), effort (EE), social influence (SI) significantly influenced behavioral intention (BI) comply practices. PE had highest impact (β = 0.56, p < 0.001), followed by EE 0.26, SI 0.21, 0.002). Facilitating conditions (FC) affected actual usage (USE) moderate 0.12, 0.036). experience moderated relationships between these constructs, suggesting younger less experienced employees more ease use expectations, while older staff relied facilitating conditions. This contributes understanding how various factors healthcare, emphasizing need for tailored interventions based demographic differences enhance practices effectively.

Language: Английский

Citations

0

Fintech-Enabled Telemedicine DOI

Shadi Askari,

Alireza Ghofrani, Hamed Taherdoost

et al.

Advances in finance, accounting, and economics book series, Journal Year: 2024, Volume and Issue: unknown, P. 313 - 330

Published: Feb. 7, 2024

This chapter examines the transformative collaboration between financial technology (Fintech) and telemedicine, highlighting their combined potential to enhance global healthcare accessibility, affordability, efficiency. Addressing regulatory, privacy, ethical considerations, explores how Fintech contributes overcoming challenges proposes secure frameworks for a Fintech-enabled telemedicine ecosystem. It also investigates role of digital currencies blockchain in facilitating cross-border transactions. The concludes with recommendations policymakers, professionals, innovators harness this collaboration's full potential, aiming shape more accessible advanced future healthcare.

Language: Английский

Citations

1

Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks DOI Open Access

Bandr Fakiha

Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, Journal Year: 2024, Volume and Issue: 15(1), P. 104 - 114

Published: March 29, 2024

As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working general operation methods around world. This research delves into complex topic network security examining hidden challenges best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment case provide in-depth understanding this essential subject. It assesses efficacy various digital procedures customized for protection using meticulously designed experiments within controlled simulated environments. findings highlight wide range organizations tasked with maintaining securing encounter. illuminates how practices can be in incident response recovery situations. results significance diversified safeguarding networks. They emphasize need modern practices, such as blockchain technology Artificial intelligence, analyzing from study.

Language: Английский

Citations

0

CYBER FRAUD AS A THREAT TO THE SUSTAINABLE DEVELOPMENT OF THE HEALTH CARE SYSTEM: A SYSTEMATIC BIBLIOMETRIC ANALYSIS DOI Open Access
Тетяна Доценко, Михайло Кузьменко

Сталий розвиток економіки, Journal Year: 2023, Volume and Issue: 2(47), P. 50 - 57

Published: Dec. 29, 2023

There is a growing wave of cyber fraud in the healthcare industry. Cases breaches confidentiality and security, leakage, theft breach medical confidential data, fraudsters gaining access to machines networks institutions have become more frequent. The main purpose study retrospective current systematic bibliometric analysis scientific research field as threat sustainable development health care system based on Scopus, VOS Viewer, Statista. relevance solving this problem lies conducting not traditional, but comprehensive innovative industry, identifying priority dynamic, geographical inter-sectoral links directions, problematic aspects. was carried out following logical sequence: determining criteria for selecting publications system; dynamics articles area; analyzing distribution research; studying subject areas under study; forming clusters by key terms; building an evolutionary temporal map relationships studied categories with other concepts dynamics. Scopus platform, Viewer software, Statista statistical database were used analytical tools study. theoretically proves existence close relationship between fraud. results proposed model industry will allow timely identification aspects terms cybersecurity, improve protection patients, patient hospital security management, strengthen devices, minimize risks losses system, organize ensure good people.

Language: Английский

Citations

0