Alade, Oluwaseun Modupe and Amusan, Elizabeth Adedoyin and Ojo, Omotayo Job (2024) Strategic Assessment of Intricacies in Healthcare Cyber Security: Analyzing Distinctive Challenges, Evaluating Their Ramifications on Healthcare Delivery, and Proposing Advanced Mitigation Strategies. Asian Journal of Research in Computer Science, 17 (5). pp. 238-248. ISSN 2581-8260
Alade1752024AJRCOS114183.pdf - Published Version
Download (446kB)
Abstract
Strategic Assessment of Intricacies in Healthcare Cyber Security: Analyzing Distinctive Challenges, Evaluating Their Ramifications on Healthcare Delivery, and Proposing Advanced Mitigation Strategies Oluwaseun Modupe Alade https://orcid.org/0000-0003-4830-1139 Elizabeth Adedoyin Amusan Omotayo Job Ojo
Healthcare firms have access to highly sensitive and valuable data, such as patient health records and payment card information. They are also becoming more reliant on Internet of Medical Things (IoMT) devices to provide treatment, and assaults on this networked equipment can result in data breaches or disruptions to crucial care of patients. Hence there is need to critically assess the intricacies in healthcare cyber security by analyzing the unique challenges facing healthcare sector, their impact on healthcare delivery and suggest some effective cyber security measures to mitigate the identified Cyber security challenges facing health care sector. The research employs a quantitative method by using the descriptive and survey approach through the use of questionnaires to elicit and gather relevant information regarding the Unique Cyber security Challenges in the Healthcare Industry. The descriptive method was used to achieve the objectives of the study while the survey technique was used to get qualitative information from respondents about effect of those cyber security challenges in the health care industry. The target sample size used for this study was 1300. However, only 980 responses were recovered and used for the analysis. Future research work suggested that strong encryption procedures can be developed and implemented for healthcare security, sophisticated anomaly detection tools can be incorporated, and cooperative frameworks for information exchange across the healthcare ecosystem could be established. Also the suggested effective measures to mitigate cyber security challenges in healthcare sector can be implemented in order to secure the patient sensitive and valuable data.
04 01 2024 238 248 10.9734/ajrcos/2024/v17i5452 https://journalajrcos.com/index.php/AJRCOS/article/view/452 https://journalajrcos.com/index.php/AJRCOS/article/download/452/895 https://journalajrcos.com/index.php/AJRCOS/article/download/452/895 https://journalajrcos.com/index.php/AJRCOS/article/download/452/896
Item Type: | Article |
---|---|
Subjects: | Universal Eprints > Computer Science |
Depositing User: | Managing Editor |
Date Deposited: | 02 Apr 2024 11:44 |
Last Modified: | 02 Apr 2024 11:44 |
URI: | http://journal.article2publish.com/id/eprint/3710 |