2022
DOI: 10.32604/iasc.2022.023460
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Implications of Healthcare Data Breaches through Computational Technique

Abstract: The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and busine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(21 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…The basic process of comprehensive risk management is divided into five steps. The implementation of risk management is inseparable from the communication of information [ 8 ]. Therefore, a complete risk management information system must be established [ 9 ], as shown in Figure 2 .…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The basic process of comprehensive risk management is divided into five steps. The implementation of risk management is inseparable from the communication of information [ 8 ]. Therefore, a complete risk management information system must be established [ 9 ], as shown in Figure 2 .…”
Section: Methodsmentioning
confidence: 99%
“…e basic process of comprehensive risk management is divided into ve steps. e implementation of risk management is inseparable from the communication of information [8].…”
Section: Basic Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This information is generated from various sources such as social media, hospital databases, bank transactions, etc. Thus, it's totally up to the users to decide whether the information is worthless or valuable [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…So, our requirement engineer cannot just simply avoid any of the operations and continue with the next operation because there will be connectivity between the operations if they skip any of those mentioned in the security requirement engineering, which was designed by the requirement engineer with the help of the partners who were well aware of the security of the software product [ 15 ].…”
Section: Introduction Of Identification Of Security Threats During Re...mentioning
confidence: 99%