Journal of
Marketing Development and Competitiveness






Scholar Gateway


Abstracts prior to volume 5(1) have been archived!

Issue 5(1), October 2010 -- Paper Abstracts
Girard  (p. 9-22)
Cooper (p. 23-32)
Kunz-Osborne (p. 33-41)
Coulmas-Law (p.42-46)
Stasio (p. 47-56)
Albert-Valette-Florence (p.57-63)
Zhang-Rauch (p. 64-70)
Alam-Yasin (p. 71-78)
Mattare-Monahan-Shah (p. 79-94)
Nonis-Hudson-Hunt (p. 95-106) 



JOURNAL OF STRATEGIC INNOVATION AND SUSTAINABILITY


Cyberthreats to Hospitals: Panacea, a Toolkit for People-Centric Cybersecurity


Author(s): Sabina Magalini, Daniele Gui, Pasquale Mari, Matteo Merialdo, Emanoulis Spanakis, Vangelis Sakkalis, Fabio Rizzoni, Alessandra Casaroli, Silvia Bonomi

Citation: Sabina Magalini, Daniele Gui, Pasquale Mari, Matteo Merialdo, Emanoulis Spanakis, Vangelis Sakkalis, Fabio Rizzoni, Alessandra Casaroli, Silvia Bonomi, (2021) "Cyberthreats to Hospitals: Panacea, a Toolkit for People-Centric Cybersecurity," Journal of Strategic Innovation and Sustainability, Vol. 16, Iss. 3, pp.185-191

Article Type: Research paper

Publisher: North American Business Press

Abstract:

Healthcare organizations are an attractive target for cyber-attacks, because the digitization of health processes is emerging as a necessity. Healthcare is a rich source of valuable data and its defences are weak. The particular weakness of this domain is due to the high complexity and dynamism of the healthcare technological environment and to the fact that healthcare working environment has many characteristics that make human behaviour a cybersecurity hazard. Cyberattacks may have significant effects on the provision of health services. Concrete measures strengthening a healthcare setting must take into account number and diversity of hospital basic components and existing security policies. The purpose of this work is to present a cybersecurity toolkit for connected devices and people. Panacea toolkit supports hospitals performing preparedness activities for example: assessment of the nature and severity of a threat, identification of mitigation measures and adoption of mitigation strategies.