Cybersecurity in health sector: a systematic review of the literature
Descripción del Articulo
Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the...
Autores: | , , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2023 |
Institución: | Universidad Tecnológica del Perú |
Repositorio: | UTP-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/7447 |
Enlace del recurso: | https://hdl.handle.net/20.500.12867/7447 http://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108 |
Nivel de acceso: | acceso abierto |
Materia: | Cyberattacks Information security Health sector https://purl.org/pe-repo/ocde/ford#1.02.00 |
id |
UTPD_d3fc0b73e59d5072a79610efb7fc36e5 |
---|---|
oai_identifier_str |
oai:repositorio.utp.edu.pe:20.500.12867/7447 |
network_acronym_str |
UTPD |
network_name_str |
UTP-Institucional |
repository_id_str |
4782 |
dc.title.es_PE.fl_str_mv |
Cybersecurity in health sector: a systematic review of the literature |
title |
Cybersecurity in health sector: a systematic review of the literature |
spellingShingle |
Cybersecurity in health sector: a systematic review of the literature Andrade Arenas, Laberiano Matías Cyberattacks Information security Health sector https://purl.org/pe-repo/ocde/ford#1.02.00 |
title_short |
Cybersecurity in health sector: a systematic review of the literature |
title_full |
Cybersecurity in health sector: a systematic review of the literature |
title_fullStr |
Cybersecurity in health sector: a systematic review of the literature |
title_full_unstemmed |
Cybersecurity in health sector: a systematic review of the literature |
title_sort |
Cybersecurity in health sector: a systematic review of the literature |
author |
Andrade Arenas, Laberiano Matías |
author_facet |
Andrade Arenas, Laberiano Matías Peve Herrera, Catherine Vanessa Mendoza Valcarcel, Jonathan Steve Díaz, Mónica Herrera Salazar, Jose Luis |
author_role |
author |
author2 |
Peve Herrera, Catherine Vanessa Mendoza Valcarcel, Jonathan Steve Díaz, Mónica Herrera Salazar, Jose Luis |
author2_role |
author author author author |
dc.contributor.author.fl_str_mv |
Andrade Arenas, Laberiano Matías Peve Herrera, Catherine Vanessa Mendoza Valcarcel, Jonathan Steve Díaz, Mónica Herrera Salazar, Jose Luis |
dc.subject.es_PE.fl_str_mv |
Cyberattacks Information security Health sector |
topic |
Cyberattacks Information security Health sector https://purl.org/pe-repo/ocde/ford#1.02.00 |
dc.subject.ocde.es_PE.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#1.02.00 |
description |
Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the privacy of personal data. The present work was carried out under a systematic literature review, which aims to show the importance of cybersecurity in the health sector knowing which tools are the most used and efficient to prevent a cyberattack. A systematic review of 301 articles was carried out, 79 of which are aligned with the objective set, fulfilling the inclusion and exclusion criteria. The search for information was carried out in the Scopus and Dimensions databases. The analysis carried out has resulted in good information that was compiled for the development of this topic, being favorable thanks to the different research of different authors. |
publishDate |
2023 |
dc.date.accessioned.none.fl_str_mv |
2023-09-12T17:03:00Z |
dc.date.available.none.fl_str_mv |
2023-09-12T17:03:00Z |
dc.date.issued.fl_str_mv |
2023 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2502-4760 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12867/7447 |
dc.identifier.journal.es_PE.fl_str_mv |
Indonesian Journal of Electrical Engineering and Computer Science |
dc.identifier.doi.none.fl_str_mv |
http://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108 |
identifier_str_mv |
2502-4760 Indonesian Journal of Electrical Engineering and Computer Science |
url |
https://hdl.handle.net/20.500.12867/7447 http://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.relation.ispartofseries.none.fl_str_mv |
Indonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 2 |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.es_PE.fl_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
dc.format.es_PE.fl_str_mv |
application/pdf |
dc.publisher.es_PE.fl_str_mv |
Institute of Advanced Engineering and Science |
dc.publisher.country.es_PE.fl_str_mv |
ID |
dc.source.es_PE.fl_str_mv |
Repositorio Institucional - UTP Universidad Tecnológica del Perú |
dc.source.none.fl_str_mv |
reponame:UTP-Institucional instname:Universidad Tecnológica del Perú instacron:UTP |
instname_str |
Universidad Tecnológica del Perú |
instacron_str |
UTP |
institution |
UTP |
reponame_str |
UTP-Institucional |
collection |
UTP-Institucional |
bitstream.url.fl_str_mv |
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/1/L.Andrade_Articulo_2023.pdf http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/2/license.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/3/L.Andrade_Articulo_2023.pdf.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/4/L.Andrade_Articulo_2023.pdf.jpg |
bitstream.checksum.fl_str_mv |
d783972a908198596fe7772764836b9a 8a4605be74aa9ea9d79846c1fba20a33 df89afacad40caff214b2dc063171480 eabef05bd2b5828362d80cda5c6b4198 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad Tecnológica del Perú |
repository.mail.fl_str_mv |
repositorio@utp.edu.pe |
_version_ |
1817984934278594560 |
spelling |
Andrade Arenas, Laberiano MatíasPeve Herrera, Catherine VanessaMendoza Valcarcel, Jonathan SteveDíaz, MónicaHerrera Salazar, Jose Luis2023-09-12T17:03:00Z2023-09-12T17:03:00Z20232502-4760https://hdl.handle.net/20.500.12867/7447Indonesian Journal of Electrical Engineering and Computer Sciencehttp://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108Currently, health centers are being affected by various cyberattacks putting at risk the confidential information of their patients and the organization because they do not have a plan or tools to help them mitigate these cyberattacks, which is important to know what measures to take to protect the privacy of personal data. The present work was carried out under a systematic literature review, which aims to show the importance of cybersecurity in the health sector knowing which tools are the most used and efficient to prevent a cyberattack. A systematic review of 301 articles was carried out, 79 of which are aligned with the objective set, fulfilling the inclusion and exclusion criteria. The search for information was carried out in the Scopus and Dimensions databases. The analysis carried out has resulted in good information that was compiled for the development of this topic, being favorable thanks to the different research of different authors.Campus Lima Centroapplication/pdfengInstitute of Advanced Engineering and ScienceIDIndonesian Journal of Electrical Engineering and Computer Science;vol. 31, n° 2info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPCyberattacksInformation securityHealth sectorhttps://purl.org/pe-repo/ocde/ford#1.02.00Cybersecurity in health sector: a systematic review of the literatureinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionORIGINALL.Andrade_Articulo_2023.pdfL.Andrade_Articulo_2023.pdfapplication/pdf516971http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/1/L.Andrade_Articulo_2023.pdfd783972a908198596fe7772764836b9aMD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52TEXTL.Andrade_Articulo_2023.pdf.txtL.Andrade_Articulo_2023.pdf.txtExtracted texttext/plain46659http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/3/L.Andrade_Articulo_2023.pdf.txtdf89afacad40caff214b2dc063171480MD53THUMBNAILL.Andrade_Articulo_2023.pdf.jpgL.Andrade_Articulo_2023.pdf.jpgGenerated Thumbnailimage/jpeg20280http://repositorio.utp.edu.pe/bitstream/20.500.12867/7447/4/L.Andrade_Articulo_2023.pdf.jpgeabef05bd2b5828362d80cda5c6b4198MD5420.500.12867/7447oai:repositorio.utp.edu.pe:20.500.12867/74472023-09-12 14:04:57.948Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.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 |
score |
13.949927 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).