Cybersecurity in health sector: a systematic review of the literature

Descripción del Articulo

Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the...

Descripción completa

Detalles Bibliográficos
Autores: Peve Herrera, Catherine Vanessa, Mendoza Valcarcel, Jonathan Steve, Díaz, Mónica, Herrera Salazar, Jose Luis, Andrade-Arenas, Laberiano
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada Norbert Wiener
Repositorio:UWIENER-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.uwiener.edu.pe:20.500.13053/9561
Enlace del recurso:https://hdl.handle.net/20.500.13053/9561
Nivel de acceso:acceso abierto
Materia:Cyberattacks; Cybersecurity; Health sector; Patients; Systematic review
1.02.00 -- Informática y Ciencias de la Información
id UWIE_f441eebd05ea26d11b463a2ac05e4f41
oai_identifier_str oai:repositorio.uwiener.edu.pe:20.500.13053/9561
network_acronym_str UWIE
network_name_str UWIENER-Institucional
repository_id_str 9398
dc.title.es_PE.fl_str_mv Cybersecurity in health sector: a systematic review of the literature
title Cybersecurity in health sector: a systematic review of the literature
spellingShingle Cybersecurity in health sector: a systematic review of the literature
Peve Herrera, Catherine Vanessa
Cyberattacks; Cybersecurity; Health sector; Patients; Systematic review
1.02.00 -- Informática y Ciencias de la Información
title_short Cybersecurity in health sector: a systematic review of the literature
title_full Cybersecurity in health sector: a systematic review of the literature
title_fullStr Cybersecurity in health sector: a systematic review of the literature
title_full_unstemmed Cybersecurity in health sector: a systematic review of the literature
title_sort Cybersecurity in health sector: a systematic review of the literature
author Peve Herrera, Catherine Vanessa
author_facet Peve Herrera, Catherine Vanessa
Mendoza Valcarcel, Jonathan Steve
Díaz, Mónica
Herrera Salazar, Jose Luis
Andrade-Arenas, Laberiano
author_role author
author2 Mendoza Valcarcel, Jonathan Steve
Díaz, Mónica
Herrera Salazar, Jose Luis
Andrade-Arenas, Laberiano
author2_role author
author
author
author
dc.contributor.author.fl_str_mv Peve Herrera, Catherine Vanessa
Mendoza Valcarcel, Jonathan Steve
Díaz, Mónica
Herrera Salazar, Jose Luis
Andrade-Arenas, Laberiano
dc.subject.es_PE.fl_str_mv Cyberattacks; Cybersecurity; Health sector; Patients; Systematic review
topic Cyberattacks; Cybersecurity; Health sector; Patients; Systematic review
1.02.00 -- Informática y Ciencias de la Información
dc.subject.ocde.es_PE.fl_str_mv 1.02.00 -- Informática y Ciencias de la Información
description Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the privacy of personal data. The present work was carried out under a systematic literature review, which aims to show the importance of cybersecurity in the health sector knowing which tools are the most used and efficient to prevent a cyberattack. A systematic review of 301 articles was carried out, 79 of which are aligned with the objective set, fulfilling the inclusion and exclusion criteria. The search for information was carried out in the Scopus and Dimensions databases. The analysis carried out has resulted in good information that was compiled for the development of this topic, being favorable thanks to the different research of different authors.
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-10-17T16:45:00Z
dc.date.available.none.fl_str_mv 2023-10-17T16:45:00Z
dc.date.issued.fl_str_mv 2023-04-02
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.13053/9561
dc.identifier.doi.none.fl_str_mv 10.11591/ijeecs.v31.i2.pp1099-1108
url https://hdl.handle.net/20.500.13053/9561
identifier_str_mv 10.11591/ijeecs.v31.i2.pp1099-1108
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Institute of Advanced Engineering and Science
dc.publisher.country.es_PE.fl_str_mv IND
dc.source.none.fl_str_mv reponame:UWIENER-Institucional
instname:Universidad Privada Norbert Wiener
instacron:UWIENER
instname_str Universidad Privada Norbert Wiener
instacron_str UWIENER
institution UWIENER
reponame_str UWIENER-Institucional
collection UWIENER-Institucional
bitstream.url.fl_str_mv https://dspace-uwiener.metabuscador.org/bitstreams/2268a45e-62a3-4a3e-bb0e-7666b30fbfb1/download
https://dspace-uwiener.metabuscador.org/bitstreams/15bb3296-42c0-41cf-bb0e-8d81ea221023/download
https://dspace-uwiener.metabuscador.org/bitstreams/b7420051-805d-452a-a343-64f3eb89960e/download
https://dspace-uwiener.metabuscador.org/bitstreams/bbec46e6-4f69-47e4-bbfa-6193c4e45c40/download
bitstream.checksum.fl_str_mv d783972a908198596fe7772764836b9a
8a4605be74aa9ea9d79846c1fba20a33
df89afacad40caff214b2dc063171480
99c254d314bd16e2dcbed2eb9c927cc0
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Wiener
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1835828963977461760
spelling Peve Herrera, Catherine VanessaMendoza Valcarcel, Jonathan SteveDíaz, MónicaHerrera Salazar, Jose LuisAndrade-Arenas, Laberiano2023-10-17T16:45:00Z2023-10-17T16:45:00Z2023-04-02https://hdl.handle.net/20.500.13053/956110.11591/ijeecs.v31.i2.pp1099-1108Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the privacy of personal data. The present work was carried out under a systematic literature review, which aims to show the importance of cybersecurity in the health sector knowing which tools are the most used and efficient to prevent a cyberattack. A systematic review of 301 articles was carried out, 79 of which are aligned with the objective set, fulfilling the inclusion and exclusion criteria. The search for information was carried out in the Scopus and Dimensions databases. The analysis carried out has resulted in good information that was compiled for the development of this topic, being favorable thanks to the different research of different authors.application/pdfengInstitute of Advanced Engineering and ScienceINDinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Cyberattacks; Cybersecurity; Health sector; Patients; Systematic review1.02.00 -- Informática y Ciencias de la InformaciónCybersecurity in health sector: a systematic review of the literatureinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationORIGINAL30801-65423-1-PB.pdf30801-65423-1-PB.pdfapplication/pdf516971https://dspace-uwiener.metabuscador.org/bitstreams/2268a45e-62a3-4a3e-bb0e-7666b30fbfb1/downloadd783972a908198596fe7772764836b9aMD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/15bb3296-42c0-41cf-bb0e-8d81ea221023/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXT30801-65423-1-PB.pdf.txt30801-65423-1-PB.pdf.txtExtracted texttext/plain46659https://dspace-uwiener.metabuscador.org/bitstreams/b7420051-805d-452a-a343-64f3eb89960e/downloaddf89afacad40caff214b2dc063171480MD53THUMBNAIL30801-65423-1-PB.pdf.jpg30801-65423-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg10806https://dspace-uwiener.metabuscador.org/bitstreams/bbec46e6-4f69-47e4-bbfa-6193c4e45c40/download99c254d314bd16e2dcbed2eb9c927cc0MD5420.500.13053/9561oai:dspace-uwiener.metabuscador.org:20.500.13053/95612024-12-13 14:17:36.807https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.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
score 13.892309
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).