دورية أكاديمية

Exploring the Strategic Cybersecurity Defense Information Technology Managers Should Implement to Reduce Healthcare Data Breaches

التفاصيل البيبلوغرافية
العنوان: Exploring the Strategic Cybersecurity Defense Information Technology Managers Should Implement to Reduce Healthcare Data Breaches
اللغة: English
المؤلفون: Mawel, Maurice, Sambasivam, Samuel
المصدر: Information Systems Education Journal. Jul 2023 21(3):4-11.
الإتاحة: Information Systems and Computing Academic Professionals. Box 488, Wrightsville Beach, NC 28480. e-mail: publisher@isedj.org; Web site: http://isedj.org
Peer Reviewed: Y
Page Count: 8
تاريخ النشر: 2023
نوع الوثيقة: Journal Articles
Reports - Research
Descriptors: Information Security, Information Technology, Confidential Records, Health Services, Leadership Responsibility, Administrator Qualifications, Allied Health Personnel, Computer Use, Data Use, Incidence, Training, Computer Security, Information Storage, Risk
تدمد: 1545-679X
مستخلص: The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare, and IT Managers' lack of leadership competence. Also, various annotations from contextual, seminal, grey, and recent literature were used to find the research problem: The strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches has not been established. The PI collected secondary data from the Office of Civil Rights (OCR)/Department of Health and Human Services (HHS). The analysis, results, and findings are provided below in Part 9. Nevertheless, the routine interaction during health information exchange (HIE) on an interoperable network and the behavior of care providers and third parties who use computers and mobile devices to exchange patient data is an opportunity for cybercriminals to install malware or launch a ransomware attack to exploit potential vulnerabilities whether to steal sensitive data or compromise the network systems. Therefore, strategic cyber defense or an innovative security model would mitigate the threat. An exploratory design is used, and an epistemological approach supports the research method and design. The study is significant, and it will contribute to the body of knowledge the PI suggested for future research and provide major recommendations.
Abstractor: As Provided
Entry Date: 2023
رقم الأكسشن: EJ1392669
قاعدة البيانات: ERIC