2021
DOI: 10.3390/s21072426
|View full text |Cite
|
Sign up to set email alerts
|

A Risk Assessment Framework Proposal Based on Bow-Tie Analysis for Medical Image Diagnosis Sharing within Telemedicine

Abstract: The purpose of this paper is to propose a framework for cybersecurity risk management in telemedicine. The framework, which uses a bow-tie approach for medical image diagnosis sharing, allows the identification, analysis, and assessment of risks, considering the ISO/TS 13131:2014 recommendations. The bow-tie method combines fault tree analysis (FTA) and event tree analysis (ETA). The literature review supported the identification of the main causes and forms of control associated with cybersecurity risks in te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 65 publications
0
6
0
Order By: Relevance
“…The ISO 31010 standard recommends its use at all stages of risk management: identifying threats, analyzing consequences, risk probabilities, and assessing operational risks. In this sense, BOW-TIE analysis is a combination of FTA and ETA ( 62 ), and is very popular since it includes both the causes and consequences of an incident scenario ( 54 ).…”
Section: Discussionmentioning
confidence: 99%
“…The ISO 31010 standard recommends its use at all stages of risk management: identifying threats, analyzing consequences, risk probabilities, and assessing operational risks. In this sense, BOW-TIE analysis is a combination of FTA and ETA ( 62 ), and is very popular since it includes both the causes and consequences of an incident scenario ( 54 ).…”
Section: Discussionmentioning
confidence: 99%
“…Any article selected as a sample for this study has to be particular to telemedicine, addressing CIA triad problems, and especially inside smart health care centers. The study was chosen for examination only if it met the inclusion criteria already written for the other thesis studies and scholarly review articles [23].…”
Section: Sampling Proceduresmentioning
confidence: 99%
“…To aid in the analysis, a hard copy was printed. The content of all of these data sources was then scanned to determine that they were linked to medical images for telemedicine systems confidentiality, integrity, and availability difficulties and concerns [16], [23].…”
Section: Sampling Proceduresmentioning
confidence: 99%
“…It's difficult to overestimate the relevance of image security in the field of medical imaging. Several studies have been carried out to ensure the security of medical healthcare photographs [8]. Encryption is the best method for image confidentiality since it prevents data loss.…”
Section: Introductionmentioning
confidence: 99%