References
- Usage and Population Statistics. 2018. Available from: https://www.internetworldstats.com/emarketing.htm
- Internet used by 3.2 billion people in 2015. 2015. Available from: https://www.bbc.com/news/technology-32884867
- Internet milestone reached, as more than 50 per cent go online: UN telecoms agency. 2018. Available from: https://news.un.org/en/story/2018/12/1027991
- McKendrick J. With Internet Of Things And Big Data, 92% Of Everything We Do Will Be In The Cloud. 2016. Available from: https://www.forbes.com/sites/joemckendrick/2016/11/13/with-internet-of-things-and-big-data-92-of-everything-we-do-will-be-in-the-cloud/#44276ddc4ed5
- Yen PY, McAlearney AS, Sieck CJ, et al. Health Information Technology (HIT) adaptation: refocusing on the journey to successful HIT implementation. JMIR Med Inform. 2017;5:e28.
- McNeely CL, Hahm J-o. The big (data) bang: policy, prospects, and challenges. Rev Policy Res. 2014;31:304–310.
- Pycroft L, Aziz TZ. Security of implantable medical devices with wireless connections: the dangers of cyber-attacks. Expert Rev Med Devices. 2018;15:403–406.
- Coventry L, Branley D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018;113:48–52.
- Martin G, Martin P, Hankin C, et al. Cybersecurity and healthcare: how safe are we? Bmj. 2017;358:j3179.
- Jalali MS, Razak S, Gordon W, et al. Health care and cybersecurity: bibliometric analysis of the literature. J Med Internet Res. 2019;21:e12644.
- Halperin D, Heydt-Benjamin TS, Fu K, et al. Security and privacy for implantable medical devices. IEEE Pervasive Comput. 2008;7:30–39.
- Ganeshan R, Enriquez AD, Freeman JV. Remote monitoring of implantable cardiac devices: current state and future directions. Curr Opin Cardiol. 2018;33:20–30.
- Slotwiner D, Varma N, Akar JG, et al. HRS expert consensus statement on remote interrogation and monitoring for cardiovascular implantable electronic devices. Heart Rhythm. 2015;12:e69–100.
- Wilkoff BL, Auricchio A, Brugada J, et al. HRS/EHRA expert consensus on the monitoring of Cardiovascular Implantable Electronic Devices (CIEDs): description of techniques, indications, personnel, frequency and ethical considerations: developed in partnership with the Heart Rhythm Society (HRS) and the European Heart Rhythm Association (EHRA); and in collaboration with the American College of Cardiology (ACC), the American Heart Association (AHA), the European Society of Cardiology (ESC), the Heart Failure Association of ESC (HFA), and the Heart Failure Society of America (HFSA). Endorsed by the Heart Rhythm Society, the European Heart Rhythm Association (a registered branch of the ESC), the American College of Cardiology, the American Heart Association. Europace. 2008;10:707–725.
- Pron G, Ieraci L, Kaulback K. Internet-based device-assisted remote monitoring of cardiovascular implantable electronic devices: an evidence-based analysis. Ont Health Technol Assess Ser. 2012;12:1–86.
- Camara C, Peris-Lopez P, Tapiador JE. Security and privacy issues in implantable medical devices: A comprehensive survey. J Biomed Inform; 2015. Vol. 55, 272–289.
- Defend B, Salajegheh M, Fu K et al. Protecting global medical telemetry infrastructure. 2008.
- Halperin D, Heydt-Benjamin TS, Ransford B, et al. Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. 2008 IEEE Symposium on Security and Privacy; Computer Science Department Faculty Publication Series, 2008;68: 129–142.
- Panescu D. Wireless communication systems for implantable medical devices. IEEE Eng Med Biol Mag. 2008;27:96–101.
- Franzen C. Dick Cheney Had the wireless disabled on his pacemaker to avoid risk of terrorist tampering. Available from: https://www.theverge.com/2013/10/21/4863872/dick-cheney-pacemaker-wireless-disabled-2007
- Cybersecurity Vulnerabilities of Hospira Symbiq Infusion System: FDA Safety Communication. 2015. Available from: https://wayback.archive-it.org/7993/20170111070006/http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm
- Beardsley T. Multiple vulnerabilities in Animas OneTouch Ping insulin pump. 2016. R7-2016-07 Available from: https://blog.rapid7.com/2016/10/04/r7-2016-07-multiple-vulnerabilities-in-animas-onetouch-ping-insulin-pump/
- Finkle J. J&J warns diabetic patients: insulin pump vulnerable to hacking. Reuters. 2016.
- MW is Short St. Jude Medical (STJ:US). 2016. Available from: http://d.muddywatersresearch.com/research/stj/mw-is-short-stj/
- Kuehn BM. Pacemaker recall highlights security concerns for implantable devices. Circulation. 2018;138:1597–1598.
- Ransford B, Kramer DB, Foo Kune D, et al. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists. Pacing Clin Electrophysiol. 2017;40:913–917.
- Slotwiner D. Editorial commentary: cybersecurity of cardiac implantable electronic devices - role of the clinician. Trends Cardiovasc Med. 2019. doi:10.1016/j.tcm.2019.01.003.
- Culligan C. Evaluating Vulnerabilities Associated with Wireless Implantable Cardiac Devices. 2018;
- Alexander B, Haseeb S, Baranchuk A. Are implanted electronic devices hackable?. Trends Cardiovasc Med. 2018.
- Moghaddasi H, Sajjadi S, Kamkarhaghighi M. Reasons in support of data security and data security management as two independent concepts: a new model. Open Med Inform J. 2016;10:4–10.
- Stallings W. Network security essentials: applications and standards. Sixth Edition. London, UK: Pearson Publisher; 2016.
- Park CS. Security mechanism based on hospital authentication server for secure application of implantable medical devices. Biomed Res Int. 2014;2014:543051.
- Fotopoulou K, Flynn BW Optimum antenna coil structure for inductive powering of passive RFID tags. 2007;71-77. IEEE International Conference on RFID; TX, USA: Grapevine. 2007 Mar 26-28.
- Baranchuk A, Refaat MM, Patton KK, et al. Cybersecurity for cardiac implantable electronic devices: what should you know? J Am Coll Cardiol. 2018;71:1284–1288.
- Saxon LA, Varma N, Epstein LM, et al. factors influencing the decision to proceed to firmware upgrades to implanted pacemakers for cybersecurity risk mitigation. Circulation. 2018;138:1274–1276.
- Furnell S, Emm D. The ABC of ransomware protection. Comput Fraud Secur. 2017;2017:5–11.
- Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. Ponemon Institute Research Report. 2016. Available from: https://www.ponemon.org/blog/sixth-annual-benchmark-study-on-privacy-security-of-healthcare-data-1
- 2018 HIMSS Cybersecurity Survey. Chicago (IL); 2018. Available from: https://www.himss.org/2018-himss-cybersecurity-survey
- Jalali MS, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: evidence from a simulation game experiment. J Strategic Inf Syst. 2019;28:66-82.
- Madnick S, Jalali MS, Siegel M et al. Measuring Stakeholders’ Perceptions of Cybersecurity for Renewable Energy Systems. 2016.
- Yoder J, Rao A, O'Hearn S, et al. Insurance 2020 & beyond: Necessity is the mother of reinvention 2015. PricewaterhouseCoopers. London (UK). 2015. Available from: https://www.pwc.com/gx/en/insurance/publications/assets/pwc-insurance-2020-and-beyond.pdf
- Postmarket Management of Cybersecurity in Medical Devices. Guidance for Industry and Food and Drug Administration Staff. Center for Devices and Radiological Health, Food and Drug Administration. Silver Spring (MD); 2016. Available from: https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf
- Slotwiner DJ, Deering TF, Fu K, et al. Cybersecurity vulnerabilities of cardiac implantable electronic devices: communication strategies for clinicians-proceedings of the heart rhythm society’s leadership summit. Heart Rhythm. 2018;15:e61–e67.
- Paulsen JE, Hazelett MB, Schwartz SB. CIED cybersecurity risks in an increasingly connected world. Circulation. 2018;138:1181–1183.
- Baldoni R, De Nicola R Il Futuro della Cyber Security in Italia 2015.
- Rostami M, Juels A, Koushanfar F Heart-to-heart (H2H): authentication for implanted medical devices. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security; 2013 Nov 4-8 Berlin (Germany). 2013. p. 1099–1112.