Analyzing the risk of cyberattacks on pharmacy information systems

Authors

  • Ashish Agrawal
  • Kunal Chandrakar

DOI:

https://doi.org/10.52783/jns.v14.1575

Keywords:

health, digitization, medical, identifying, cyber risk

Abstract

As the world moves closer to a cashless and paperless economy, digitization is essential for any firm to succeed. Although initiatives to encourage digitization have been started, cyber risk was overlooked, and the danger of cyberattacks has been rising and is far more than the perceived risk of cyber. Globally, there has been a startling rise in cyberattacks of all kinds, which have in certain cases caused some businesses to become unstable and taken days or months to recover. In addition to the other operational problems, the recovery period resulted in cost and market share loss. This study aimed to determine the factors that influence an individual's readiness to manage cyber risks by examining the role of respondents' online behavior, awareness of cyber risks, experience with cyber risks, and attitude toward cyber risks in lowering the incidence of cyber risks. 385 respondents were given a structured questionnaire by the researcher, and the information gathered was coded and revised for additional analysis. The data was subjected to univariate, bivariate, and multivariate analysis, and the researcher employed regression, t-test, and Anuva to highlight the study's framework. The findings show that an individual's online behavior and awareness of cyber hazards contribute to their readiness to manage those risks. An individual will be able to improve their readiness to manage cyber hazards with the help of the findings

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Kwon J, Johnson ME. Healthcare security strategies for regulatory compliance and data security. In2013 46th Hawaii International Conference on System Sciences 2013 Jan 7 (pp. 3972-3981). IEEE. https://doi.org/10.1109/HICSS.2013.246

Kelly B, Quinn C, Lawlor A, Killeen R, Burrell J. Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health. 2023 Jan 2:213-31. https://doi.org/10.1007/978-3-031-11199-0_11

Majid UMA, Atan NA, Rukli R, Khan A. Framework of computer science learning through hybrid service-learning oriented visual toward the continuum of visualization thinking and generic skills. Indian J Inf Sour Serv. 2024;14(3):192-206. https://doi.org/10.51983/ijiss-2024.14.3.25

Thomasian NM, Adashi EY. Cybersecurity in the internet of medical things. Health Policy and Technology. 2021 Sep 1;10(3):100549. https://doi.org/10.1016/j.hlpt.2021.100549

Aziz B. A note on the problem of semantic interpretation agreement in steganographic communications. Journal of Internet Services and Information Security. 2021 Aug 31;11(3):47-57. https://doi.org/10.22667/JISIS.2021.08.31.047

Lechner NH. An overview of cybersecurity regulations and standards for medical device software. InCentral European Conference on Information and Intelligent Systems 2017 (pp. 237-249). Faculty of Organization and Informatics Varazdin.

Caviglione L, Wendzel S, Mileva A, Vrhovec S. Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2021 Dec;12(4):1-3.

Anderson S, Williams T. Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces. 2018 Feb 1; 56:134-43. https://doi.org/10.1016/j.csi.2017.10.001

Sharma N, Rajput A. Development of a Genomic-based Predictive Model for Warfarin Dosing. Clinical Journal for Medicine, Health and Pharmacy. 2024 Jun 28;2(2):11-9.

Marotta A, Madnick S. Cybersecurity as a unifying factor for privacy, compliance and trust: The Haga Hospital case. Issues in Information Systems. 2022 Jan 1;23(1). https://doi.org/10.48009/1_iis_2022_108

Saranya N, Geetha K, Rajan C. Data replication in mobile edge computing systems to reduce latency in internet of things. Wireless Personal Communications. 2020 Jun;112(4):2643-62. https://doi.org/10.1007/s11277-020-07168-7

Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors. 2021 Jul 28;21(15):5119. https://doi.org/10.3390/s21155119

Lee CD, Ho KI, Lee WB. A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine. 2011 May 12;15(4):550-6. https://doi.org/10.1109/TITB.2011.2154363

Abraham C, Chatterjee D, Sims RR. Muddling through cybersecurity: Insights from the US healthcare industry. Business horizons. 2019 Jul 1;62(4):539-48. https://doi.org/10.1016/j.bushor.2019.03.010

Udayakumar R, Pansambal SY, Gajmal YM, Vimal VR, Sugumar R. User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.

Busdicker M, Upendra P. The role of healthcare technology management in facilitating medical device cybersecurity. Biomedical Instrumentation & Technology. 2017 Nov;51(s6):19-25. https://doi.org/10.2345/0899-8205-51.s6.19

Downloads

Published

2025-02-06

How to Cite

1.
Agrawal A, Chandrakar K. Analyzing the risk of cyberattacks on pharmacy information systems. J Neonatal Surg [Internet]. 2025Feb.6 [cited 2025Mar.20];14(1S):542-7. Available from: https://jneonatalsurg.com/index.php/jns/article/view/1575

Most read articles by the same author(s)