Literature Review of Cybersecurity in Healthcare
Perform a literature review on a health care barrier or issue (cybersecurity) using the GCU Library. Present 8-10 peer-reviewed primary research articles. These articles should be either qualitative or quantitative.
***Please use this link to access the GCU Library: http://library(dot)gcu(dot)edu/ - click "find journal articles" - check the "peer reviewed" box - scroll down to the "browse by subject" drop down and select "nursing & health sciences" - click the "CINAHL Complete" hyperlink and begin searching for articles. (logins will be provided, ask support)
You may use either health care or nursing peer-reviewed journals; however, at least half of the primary articles must come from peer-reviewed nursing journals. The peer-reviewed articles must consist of research published within the last 5 years.
Use the "HLT-494 - Literature Evaluation Table" template to document your detailed assessment of each primary study. This document helps break down the components of each article to ensure the article meets the requirements for a professional nursing paper. Ensure that each of your articles provides information that meets each criterion listed. Assess the research and provide a detailed and clear explanation how each article supports your capstone project and evidence-based practice (between five and six sentences).
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
Student Name:
Summary of health care administration issue (200-250 words):
Criteria
Article 1
Article 2
Article 3
APA-Formatted Article Citation With Permalink
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology & Health Care, 25(1), 1–10. https://doi-org.lopes.idm.oclc.org/10.3233/THC-161263
Bhuyan, S.S., Kabir, U., Escareno, J.M. , et al. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. J Med Syst 44, 98 (2020). https://doi.org/10.1007/s10916-019-1507-y
Coventry L, Branley D. Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas. 2018 Jul;113:48-52. DOI: 10.1016/j.maturitas.2018.04.008. Epub 2018 Apr 22. PMID: 29903648.
How Does the Article Relate to the Health Care Barrier?
The article discusses the current threats in healthcare while also showcasing the trends in cybersecuritycybersecurity trends, including topics like ransomware.
It seeks to discuss the various ways cybersecurity in healthcare could be enhanced, especialmainly through preventive strategies.
This article discusses the trends in cybersecuritycybersecurity trends, the threats to cybersecurity in the healthcare sector and offers recommendations for how to proceed.
Quantitative, Qualitative (How do you know?)
Qualitative – considers the results of the studies and offers interpretations of the same.
Qualitative – it does not test any hypothesis but explores ways in whichhow cybersecurity could be transformed in depth.
Qualitative – considers results of studies and makes interpretations and conclusions based on these.
Purpose Statement
To identify cybersecurity trends, including recent threats in regards toregarding ransomware and its relationship to the healthcare industry through academic literature.
Discusses emerging threats posed by cyberattacks in healthcare and the key players in cybersecurity.
The article does not have a clearly defined purpose statement, but it seeks a progressive review of how healthcare organizations can respond to cybersecurity threats.
Research Question
Does not have a defined research question.
There is no defined or specific research question.
Why is healthcare vulnerable?
Why is healthcare targeted?
What threats and consequences is healthcare currently experiencing?
What is the role of legislation and standards?
How can the healthcare sector move forward?
Outcome
There is a need to enhance the security of healthcare systems.
There is a need for a strong cybersecurity foundation to avoid threats.
Healthcare organizations need to react strategically to curtail current and future threats.
Setting (Where did the study take place?)
Online.
Online.
Online.
Sample
31 research studies.
No sample was used.
1249 articles.
Method
Searching the CINAHL, PubMed (Medline), and the Nursing and Allied Health Source vie ProQuest databases.
A review of different sources and peer-reviewed material online.
Used the PubMed database to search for the articles.
Key Findings of the Study
Cybersecurity lags behind for healthcare.
There is a need to define the specific duty of cybersecurity and to establish clear procedures for handling a data breach.
Training of users is needed.
The majorsignificant types of cybersecurity issues in healthcare organizations include DoS attacks, cryptographic attacks, privilege escalation, man-in-the-middle attacks, malicious software, phishing, and structured query language injections exploit.
The study also lists these as major players in cybersecuritycybersecurity players, including cyber-attackers, cyber defenders, end-users, and developers.
Interconnected technology is a majorsignificant impediment to security in healthcare organizations.
Healthcare organizations are big repositories, thus big targets.
Hacking is a majorsignificant threat to healthcare.
Recommendations of the Researcher
There is a need to adapt to the ever-changing cybersecurity trends and threats.
Policymakers to identify targets prone to cyberattacks.
Healthcare organizations to develop strategies to deal with cyberattacks instead of the case by -by-case approach.
A cyber resilience that offers a holistic view of cyber risk for healthcare organizations is needed.
There is a need to invest more money and effort to ensure the security of healthcare technologies.
Criteria
Article 4
Article 5
Article 6
APA-Formatted Article Citation with Permalink
Zeadally, S., Siddiqui, F., Baig, Z., & Ibrahim, A. (2019). Challenges and Potential Solutions Using Internet of Things (IoT) and Big Data Analytics. PSU Research Review, 4(2), 149-168. https://doi.org/10.1108/PRR-08-2019-0027
Liu, H., Crespo, R. G., & Martínez, O. S. (2020). Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts. Healthcare, 8(3), 243. doi:10.3390/healthcare8030243
Jalali MS, Kaiser JPCybersecurity in Hospitals: A Systematic, Organization...