2024
DOI: 10.1038/s41746-024-01000-3
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of cloud computing in the German healthcare system

M. Putzier,
T. Khakzad,
M. Dreischarf
et al.

Abstract: With the advent of artificial intelligence and Big Data - projects, the necessity for a transition from analog medicine to modern-day solutions such as cloud computing becomes unavoidable. Even though this need is now common knowledge, the process is not always easy to start. Legislative changes, for example at the level of the European Union, are helping the respective healthcare systems to take the necessary steps. This article provides an overview of how a German university hospital is dealing with European… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 26 publications
0
0
0
Order By: Relevance
“…Furthermore, by applying established security frameworks such as ISO, NIST SP800-30r1, and OCTAVE strengthen the comprehensive integration of technologies, reinforce security for smart systems. Current security standards include information on suggested security controls, baselines, protocols with smart lines that are thought to be optimal for networks and, in some situations, required for compliance (Putzier et al, 2024). In contrast, many security assessment frameworks now in use include security best practices, techniques, and recommendations that organizations may use to ensure the implementation of successful cyber risk assessment strategies (Esho et al, 2024).…”
Section: Security Standards and Assessment Frameworkmentioning
confidence: 99%
“…Furthermore, by applying established security frameworks such as ISO, NIST SP800-30r1, and OCTAVE strengthen the comprehensive integration of technologies, reinforce security for smart systems. Current security standards include information on suggested security controls, baselines, protocols with smart lines that are thought to be optimal for networks and, in some situations, required for compliance (Putzier et al, 2024). In contrast, many security assessment frameworks now in use include security best practices, techniques, and recommendations that organizations may use to ensure the implementation of successful cyber risk assessment strategies (Esho et al, 2024).…”
Section: Security Standards and Assessment Frameworkmentioning
confidence: 99%