Abstract
Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.
- Eastwood, B. Premera says data breach may affect 11 million consumers. FierceMobileHealthcare (Mar. 18, 2015); http://www.fiercehealthit.com/story/premera-says-data-breach-may-affect-11-million-consumers/2015-03-18.Google Scholar
- Fu, K. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics. IOM (Institute of Medicine) Workshop Report, National Academies Press, Washington, D.C., July 2011; https://spqr.eecs.umich.edu/papers/futrustworthy-medical-device-software-IOM11.pdf.Google Scholar
- Gagliord, N. Healthcare cybersecurity worse than retail: BitSight. (May 28, 2014); http://www.zdnet.com/article/healthcare-cybersecurity-worse-than-retail-bitsight/.Google Scholar
- Gunter, C.A., Liebovitz, D.M., and Malin, B. Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Security & Privacy 9, 5 (Sept./Oct. 2011); DOI 10.1109/MSP.2011.72. Google ScholarDigital Library
- Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE Press (May 2008), 129--142; DOI: 10.1109/SP.2008.31. Google ScholarDigital Library
- Ponemon Institute. Third annual benchmark study on patient privacy and data security (Dec. 2012); http://www.ponemon.org/local/upload/file/Third_Annual_Study_Patient_Privacy_FINAL5.pdf.Google Scholar
- Millions of Anthem customers targeted in cyberattack. New York Times (Feb. 5, 2015); http://www.nytimes.com/2015/02/05/business/hackers-breached-data-of-millions-insurer-says.html.Google Scholar
- Naveed, M. et al. Privacy in the genomic era. ACM Comput. Surv. 48, 1, Article 6 (July 2015); DOI: http://dx.doi.org/10.1145.2767007.Google ScholarDigital Library
- O'Harrow, Jr., R. Health-care sector vulnerable to hackers, researchers say. Washington Post (Dec. 2012); http://articles.washingtonpost.com/2012-12-25/news/36015727_1_health-care-medical-devices-patient-care.Google Scholar
- Sametinger, J., Rozenblit, J., Lysecky, R., and Ott, P. Security challenges for medical devices. Commun. ACM 58, 4 (Apr. 2015), 74--82; DOI 10.1145/2667218. Google ScholarDigital Library
- White House. FACT SHEET: President Obama's Precision Medicine Initiative (Jan. 30, 2015); https://www.whitehouse.gov/the-press-office/2015/01/30/fact-sheet-president-obama-s-precision-medicine-initiative.Google Scholar
- Whittaker, R. Issues in mHealth: Findings from key informant interviews. Journal of Medical Internet Research 14, 5 (May 2012); DOI 10.2196/jmir.1989.Google ScholarCross Ref
Index Terms
- Security for mobile and cloud frontiers in healthcare
Recommendations
Analysis of Security Protocols for Mobile Healthcare
Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for ...
On-Cloud Healthcare Clinic
Advances in telecommunication and online service solutions help to bridge the digital divide between rural and urban healthcare services, enabling provision of suitable medical diagnosis and treatment consultations. Although applying e-health solutions ...
Comments