44
Views
0
CrossRef citations to date
0
Altmetric
ORIGINAL RESEARCH

Security Risk Assessment for Patient Portals of Hospitals: A Case Study of Taiwan

, ORCID Icon & ORCID Icon
Pages 1647-1656 | Received 07 Feb 2024, Accepted 29 May 2024, Published online: 18 Jun 2024

References

  • Appar A, Johnson ME. Information security and privacy in healthcare: Current state of research.Int. J Internet Enter Manag. 2010;6:279–314. doi:10.1504/IJIEM.2010.035624
  • Samy GN, Ahmad R, Ismail Z. Security threats categories in healthcare information systems. Health Informat J. 2010;16:201–209. doi:10.1177/1460458210377468
  • Tapuria A, Porat T, Kalra D, Dsouza G, Xiaohui S, Curcin V. Impact of patient access to their electronic health record: systematic review. Inform Health Soc Care. 2021;46(2):192–204. doi:10.1080/17538157.2021.1879810
  • Petrovskaya O, Karpman A, Schilling J, et al. patient and health care provider perspectives on patient access to test results via web portals: Scoping review. JMIR Med Inform. 2022;10(7):7.
  • Antonio MG, Petrovskaya O, Lau F. The state of evidence in patient portals: Umbrella review. J Med Internet Res. 2020;22(11):e23851. doi:10.2196/23851
  • Lyles CR, Nelson EC, Frampton S, Dykes PC, Cemballi AG, Sarkar U. Using electronic health record portals to improve patient engagement: research priorities and best practices. Ann Intern Med. 2020;172(11 Suppl):S123–S129. doi:10.7326/M19-0876
  • Wen HC, Chang WP, Hsu MH, Ho CH, Chu CM. An Assessment of the Interoperability of Electronic Health Record Exchanges Among Hospitals and Clinics in Taiwan. JMIR Med Inform. 2019;7(1):e12630. doi:10.2196/12630
  • Gandhi VK. An Overview Study on Cyber crimes in Internet. J Inform EngAppl. 2012;2:1–5.
  • Parikh TP, Patel AR. Cyber security: study on Attack, Threat, Vulnerability. Int J Res Mod Eng Emerg Tech. 2017;5:1–7.
  • Bhatia P, Sehrawat R. Type of security threats and its prevention. Int J Sci Res Dev. 2012; 2.
  • Abomhara M, Kien GM. Cyber Security and the Internet of Things: vulnerabilities, Threats, Intruders and Attacks. J Cyber Secur Mobil. 2015;4:65–88. doi:10.13052/jcsm2245-1439.414
  • Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int J Adv Comput Res. 2016;6:31–38. doi:10.19101/IJACR.2016.623006
  • Choo KR. The cyber threat landscape: challenges and future research directions. ComputSecur. 2011;30:719–731.
  • Amarendra K, Mandhala VN, Damecharla S, Gollapudi P, Ponuganti PK. Modern Era Hacking. Int J Sci Technol Res. 2019;8:920.
  • Alsalim M, Alsalim A, Al-madhagi A, Shahen S. INFORMATION SECURITY THREATS: COMPUTER HACKING. Int J Adv Res. 2017;5:349–356. doi:10.21474/IJAR01/2753
  • Dashora K. Cyber Crime in the Society: problems and Preventions. J Alter Perspect SociSci. 2011;3:240–259.
  • Pavlik K. Cybercrime, Hacking, And Legislation. J Cyber Res. 2017;1:13–16.
  • Madarie R. Hackers’ motivations: Testing Schwartz’s theory of motivational types of values in a sample of hackers. Int J Cyber Crim. 2017;11:78–97.
  • Fan CM Security policy for hospitals and medical Industry influence. Available from https://s.itho.me/cybersec/2020/slides/8622.pdf. [accessed Nov 9, 2023].
  • Shah N, Farik M. Ransomware - Threats, vulnerabilities and recommendations. Int J Sci Technol Res. 2017;6:307–309.
  • Aurangzeb S, Aleem M, Iqbal MA, Islam MA. Ransomware: a Survey and Trends. J Inf Assur Secur. 2017;12:48–58.
  • Kansagra D, Kumhar M. Ransomware: a Threat to Cyber security. Int J Comp Sci Communic. 2016;7:224–227.
  • Idrissi SE, Berbiche N, Guerouate F, Sbihi M. Performance evaluation of web application security scanners for prevention and protection against vulnerabilities. Int J ApplEng Res. 2017;12:11068–11076.
  • Sheikh BA, Rajmohan P. Internet banking, security models and weakness. Int J Res Manag Bus Stud. 2015;2:17–22.
  • Bhatt D. Cyber security risks for modern web applications: Case study paper for developers and security testers. Int J Sci Technol Res. 2018;7:232–235.
  • Alabady S. Design and Implementation of a network security model for cooperative network. Int Arab J e-Tech. 2009;1:26–36.
  • Charoen D. Password Security. Int J Secur. 2014;8:1–14.
  • Gitanjali ST, Sasikala D. Vulnerability assessment of web applications using penetration testing. Int J Recent Tech Eng. 2019;8:1552–1556.
  • Sukumar A, Mahdiraji HA, Jafari-Sadeghi V. Cyber risk assessment in small and medium-sized enterprises: a multilevel decision-making approach for small e-tailors. Risk Anal. 2023;43(10):2082–2098. doi:10.1111/risa.14092
  • NIST. The NIST Cybersecurity Framework (CSF) 2.0. Available from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf. Accessed May 11, 2024.
  • Patil HP, Gosavi PB. web vulnerability scanner by using HTTP method. Int J Comput Sci Mobile Comput. 2015;4:255–260.
  • Mike B. Free Website Security Scan. Available fromhttps://webscan.upguard.com/. Accessed May 11, 2024.
  • Hosseini N, Fakhar F, Kiani B, Eslami S. Enhancing the security of patients’ portals and websites by detecting malicious web crawlers using machine learning techniques. Int J Med Inform. 2019;132:103976. doi:10.1016/j.ijmedinf.2019.103976
  • Manzoor J, Waleed A, Jamali AF, Masood A, Kovtun V. Cybersecurity on a budget: evaluating security and performance of open-source SIEM solutions for SMEs. PLoS One. 2024;19(3):e0301183. doi:10.1371/journal.pone.0301183
  • Ilca LF, Lucian OP, Balan TC. Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, Detection and response. Sensors. 2023;23(15):6757. doi:10.3390/s23156757
  • Li YC, Yen JC, Chiu WT, Jian WS, Syed-Abdul S, Hsu MH. Building a national electronic medical record exchange system - experiences in Taiwan. Comput Meth Progr Biomed. 2015;121(1):14–20. doi:10.1016/j.cmpb.2015.04.013
  • Seh AH, Zarour M, Alenezi M, et al. Healthcare Data Breaches: insights and Implications. Healthcare. 2020;8(2):133. doi:10.3390/healthcare8020133
  • Stanimirovic D. eHealth Patient Portal - Becoming an Indispensable Public Health Tool in the Time of Covid-19. Stud Health Technol Inform. 2021;281:880–884. doi:10.3233/SHTI210305
  • Portz JD, Brungardt A, Shanbhag P, et al. Advance Care Planning Among Users of a Patient Portal During the COVID-19 Pandemic: retrospective Observational Study. J Med Internet Res. 2020;22(8):e21385. doi:10.2196/21385
  • Shi Y, Chang X, Rodríguez RJ, Zhang Z, Trivedi KS. Quantitative security analysis of a dynamic network system under lateral movement-based attacks. Reliab Eng Syst Saf. 2019;183:213–225. doi:10.1016/j.ress.2018.11.022