<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v26i1e46904</article-id>
      <article-id pub-id-type="pmid">38820579</article-id>
      <article-id pub-id-type="doi">10.2196/46904</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Marshall</surname>
            <given-names>Robert</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Perez Jover</surname>
            <given-names>Virtudes</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Ewoh</surname>
            <given-names>Pius</given-names>
          </name>
          <degrees>MBA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Technology and Innovations</institution>
            <institution>Information Systems Science</institution>
            <institution>University of Vaasa</institution>
            <addr-line>Wolffintie 32</addr-line>
            <addr-line>Vaasa, 65200</addr-line>
            <country>Finland</country>
            <phone>358 414888477</phone>
            <email>pius.ewoh@uwasa.fi</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4006-619X</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Vartiainen</surname>
            <given-names>Tero</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3843-8561</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Technology and Innovations</institution>
        <institution>Information Systems Science</institution>
        <institution>University of Vaasa</institution>
        <addr-line>Vaasa</addr-line>
        <country>Finland</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Pius Ewoh <email>pius.ewoh@uwasa.fi</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>31</day>
        <month>5</month>
        <year>2024</year>
      </pub-date>
      <volume>26</volume>
      <elocation-id>e46904</elocation-id>
      <history>
        <date date-type="received">
          <day>3</day>
          <month>3</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>27</day>
          <month>7</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>17</day>
          <month>10</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>8</day>
          <month>3</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Pius Ewoh, Tero Vartiainen. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 31.05.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2024/1/e46904" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Health care organizations worldwide are faced with an increasing number of cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant data breaches in digital health information systems, which threaten patient safety and privacy.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>From a sociotechnical perspective, this paper explores why digital health care systems are vulnerable to cyberattacks and provides sociotechnical solutions through a systematic literature review (SLR).</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>An SLR using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) was conducted by searching 6 databases (PubMed, Web of Science, ScienceDirect, Scopus, Institute of Electrical and Electronics Engineers, and Springer) and a journal (<italic>Management Information Systems Quarterly</italic>) for articles published between 2012 and 2022 and indexed using the following keywords: “(cybersecurity OR cybercrime OR ransomware) AND (healthcare) OR (cybersecurity in healthcare).” Reports, review articles, and industry white papers that focused on cybersecurity and health care challenges and solutions were included. Only articles published in English were selected for the review.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In total, 5 themes were identified: human error, lack of investment, complex network-connected end-point devices, old legacy systems, and technology advancement (digitalization). We also found that knowledge applications for solving vulnerabilities in health care systems between 2012 to 2022 were inconsistent.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This SLR provides a clear understanding of why health care systems are vulnerable to cyberattacks and proposes interventions from a new sociotechnical perspective. These solutions can serve as a guide for health care organizations in their efforts to prevent breaches and address vulnerabilities. To bridge the gap, we recommend that health care organizations, in partnership with educational institutions, develop and implement a cybersecurity curriculum for health care and intelligence information sharing through collaborations; training; awareness campaigns; and knowledge application areas such as secure design processes, phase-out of legacy systems, and improved investment. Additional studies are needed to create a sociotechnical framework that will support cybersecurity in health care systems and connect technology, people, and processes in an integrated manner.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>health care systems</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>sociotechnical</kwd>
        <kwd>medical device</kwd>
        <kwd>secure systems development</kwd>
        <kwd>training</kwd>
        <kwd>ransomware</kwd>
        <kwd>data breaches</kwd>
        <kwd>protected health information</kwd>
        <kwd>patient safety</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Cybersecurity in health care systems entails the safeguarding of electronic information and assets against unauthorized access, use, and disclosure [<xref ref-type="bibr" rid="ref1">1</xref>]. The main objective of cybersecurity in health care systems is to protect the privacy, integrity, and accessibility of health information to provide secure health care services. Despite the digital transformation in health care delivery, health care organizations are facing increasing challenges and crises, which include data breaches of patient health information and vulnerability in their critical infrastructure [<xref ref-type="bibr" rid="ref2">2</xref>]. Research has highlighted that health care systems are becoming more vulnerable to cyberattacks as technology advances [<xref ref-type="bibr" rid="ref3">3</xref>]. Furthermore, the internet and its diverse nature and connection to the delivery of telehealth and continuous health care services create multiple points of access for cyberattacks [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>].</p>
        <p>In high-income countries such as Finland, the United States, and the United Kingdom, integrated technology is used to monitor and manage health care systems. For instance, at least 10 to 15 medical devices are linked to each patient’s electronic bed in a public hospital [<xref ref-type="bibr" rid="ref6">6</xref>]. These complexities increase the susceptibility of health care networks to cyberattacks [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. Studies conducted through the simulation of medical devices have similarly revealed that pacemakers and pulse oximeters can be hacked and compromised without a physician’s knowledge [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Ransomware is another type of man-made malware that can disrupt health care systems by infecting computer systems, locking people out of their files, and then demanding a ransom payment in exchange for access to those files [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Cyberattackers can publish the exposed health information to the web or sell it on the dark web [<xref ref-type="bibr" rid="ref12">12</xref>]. This type of attack can result in breaches of patient privacy, subjecting health care organizations to fines that are consistent with human health service regulations and European General Data Protection Regulation (GDPR) policies for data breaches. For example, research has shown that, between 2012 and 2022, more than US $128,244,290 million in fines were paid in the United States alone for violations of Health Insurance Portability and Accountability Act laws on data breaches against health care organizations [<xref ref-type="bibr" rid="ref13">13</xref>]. Although these fines were derived from no less than 111 health care organizations, many organizations have failed to report breaches.</p>
        <p>Cybersecurity education is seriously lacking [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. Moreover, a critical problem with cybersecurity in health care systems is the lack of involvement or recruitment of people with expertise and training in cybersecurity [<xref ref-type="bibr" rid="ref16">16</xref>], resulting in considerable neglect of the cybersecurity infrastructure [<xref ref-type="bibr" rid="ref17">17</xref>]. A systematic literature review (SLR) revealed that, between 2018 and 2019, more than 24% of the data breaches in all industries happened within the health care context [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        <p>Between 2009 and 2021, the US Department of Health and Human Services office reported 4419 health care data breaches, resulting in &#62;314 million health care records being lost, stolen, or exposed [<xref ref-type="bibr" rid="ref20">20</xref>]. In 2015, an estimated 113.27 million records were stolen and exposed, and in 2021 alone, the US Department of Health and Human Services also reported at least 2 health care data leaks daily [<xref ref-type="bibr" rid="ref13">13</xref>]. The statistics clearly show an upward trend in health care data breaches over the past 10 years [<xref ref-type="bibr" rid="ref21">21</xref>]. When considering this trend on a global scale, the number of health information breaches could potentially reach into the billions of health records. Organizations such as Vaastimo Oy Finland; National Health Service trusts in the United Kingdom; Anthem, Inc; Premera Blue Cross; and Excellus Health Plan have been victims of these threats and breaches of health information. Breaches and vulnerabilities in health care delivery, human safety, and protection of sensitive information are deeply disconcerting. However, it can be argued that research solutions are fragmented and sparse. There is a gap in the knowledge areas of health care cybersecurity in the literature and in practice regarding the vulnerability of health care systems and the reasons for cyberattacks. The argument and motivation are that a holistic approach to security is needed because humans are the weakest link in the cyberattack chain [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] have highlighted the need for resilience and changes in their studies on human behavior, technology, and processes as part of a holistic solution to the problem of health care system vulnerability. The information, technology, processes, objectivity and values, skills and knowledge, management systems and structure, and other resources dimensions by Heeks [<xref ref-type="bibr" rid="ref23">23</xref>] also point out that avoiding security design reality gaps requires approaching the security functionality of a health information system as a sociotechnical system and not as a technical system. Security by design, or secure design, is an approach to cybersecurity that enables organizations to automate their data security controls and formalize the design of their infrastructure so that they can build security into their IT management processes [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>].</p>
        <p>In this study, a sociotechnical approach is defined as the interaction between humans and technology with the aim of creating technically efficient organizational information systems and user satisfaction [<xref ref-type="bibr" rid="ref26">26</xref>]. Furthermore, conceptualizations of this approach are concerned with 3 primary dimensions: the social environment, technical environment, and organizational environment [<xref ref-type="bibr" rid="ref27">27</xref>]. Sociotechnical design is identified as an approach to connect the integration of systems while ensuring that the multifaceted challenges and complexities in smart health care are well managed [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Smart health care can be defined as care that is equipped with smart IT, such as Internet of Medical Things (IoMT) devices that have the capabilities to anticipate and diagnose patient diseases; respond to treatments; guide, manage, and improve user comfort; and provide security and entertainment via hospital management systems. According to Coiera [<xref ref-type="bibr" rid="ref30">30</xref>], “if healthcare is to evolve at a pace that will meet the needs of society, it will need to embrace the science of sociotechnical design.” Therefore, the application of a sociotechnical perspective in health care cybersecurity in this study aimed at better understanding and mitigating the multifaceted challenges and poor uptake and performance of health care system security within health care organizations.</p>
        <p>This existing gap in knowledge and practice was a major motivation for this SLR. It is necessary to connect the fragmented research and manage this knowledge gap regarding why health care systems are vulnerable to cyberattacks as the study by Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] did not address this aspect in detail. An SLR was conducted to develop proactive cybersecurity strategies to mitigate threats and vulnerabilities that result in health care data breaches by proposing sociotechnical solutions and recommendations. Furthermore, to link human behavior, technology, and processes as highlighted by Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] and supported by the narrative review by Mohan et al [<xref ref-type="bibr" rid="ref31">31</xref>] for further research, these 3 core areas can be interpreted as a sociotechnical framework [<xref ref-type="bibr" rid="ref27">27</xref>]. It is essential to mitigate the increase in breaches of health information and protect health care from cybercrime and cyberattacks on critical health care infrastructure. However, none of these studies have examined why health care systems are vulnerable to attack through a sociotechnical lens. On the basis of this knowledge gap identified in the literature, the following research questions (RQs) were raised: (1) Why are health care systems vulnerable to cyberattacks? (RQ 1) (2) How can health care systems be protected? (RQ 2).</p>
        <p>The objective of this review was to explore from a sociotechnical approach why digital health care systems are vulnerable to cyberattacks, provide sociotechnical solutions, and identify the areas of health care systems that need further improvement.</p>
      </sec>
      <sec>
        <title>Previous Literature Review</title>
        <p>Regarding the existing literature on health care cybersecurity, our previous SLR identified the following review themes: (1) cybersecurity threats and trends: studies that provide solutions and insights into threats and trends have been conducted to address cybersecurity threats and trends in health care systems [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]; (2) cybersecurity vulnerability: some studies have also investigated the cybersecurity vulnerability of health care systems to provide solutions and future directions for health care services [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>]; and (3) cybersecurity interceptions in health care: studies have also investigated cybersecurity interceptions with health care systems to protect the security posture of these systems [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]—Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] have highlighted the need for further studies on human behavior, technology, and processes to further investigate why health care systems are vulnerable and provide a holistic solution to this problem.</p>
        <p>Therefore, there is a need for further studies to identify the reasons behind the increase in health information breaches in health care systems. This area of study through a sociotechnical lens is lacking. Accordingly, our SLR critically investigated why health care systems are vulnerable to cyberattacks and expanded this area of study from a sociotechnical point of view. This review is significant given the lack of SLRs on the areas linking human behavior, technology, and processes using a holistic approach from a sociotechnical viewpoint in this context and as the studies by Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] and Mohan et al [<xref ref-type="bibr" rid="ref31">31</xref>] were based on narrative reviews.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Protocol and Registration</title>
        <p>The PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines were followed to conduct our SLR using the checklist guide [<xref ref-type="bibr" rid="ref38">38</xref>] (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). The aim of this review was to identify the reasons why health care systems are vulnerable to cyberattacks and provide sociotechnical solutions. In the planning stage of this review, a protocol for the sources of information, search strategies, study selection, criteria for eligibility, and data collection processes was created, and this review was not registered.</p>
      </sec>
      <sec>
        <title>Eligibility Criteria</title>
        <p>A paper was selected for inclusion if it was published in English and comprised a full-text version of the manuscript, review paper, conference proceeding paper, report, news article or website, or white paper published between 2012 and 2022. The introduction, abstract, results, and discussion sections of the paper were checked by the authors for conformity with the study objectives and critical appraisal using the checklist guidelines before inclusion. Research papers were excluded if they were not relevant to the research areas—cybersecurity, cybercrime, ransomware, and health care. These criteria are presented in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
        <boxed-text id="box1" position="float">
          <title>Article inclusion and exclusion criteria.</title>
          <p>
            <bold>Inclusion criteria</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Study types: published peer-reviewed and original research papers (empirical and conceptual papers)</p>
            </list-item>
            <list-item>
              <p>Bibliometric study types: white papers and cybersecurity news reports in line with health care and cybersecurity</p>
            </list-item>
            <list-item>
              <p>Period: papers published between 2012 and 2022</p>
            </list-item>
            <list-item>
              <p>Language: English</p>
            </list-item>
            <list-item>
              <p>Subjects and domain: computer sciences, health care, and cybersecurity</p>
            </list-item>
            <list-item>
              <p>Requirements for paper inclusion: full-text papers.</p>
            </list-item>
          </list>
          <p>
            <bold>Exclusion criteria</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Study types: unpublished work, editorial letters, textbooks, and research in progress</p>
            </list-item>
            <list-item>
              <p>Language: any other languages</p>
            </list-item>
            <list-item>
              <p>Subjects: studies outside the domain of cybersecurity and health care</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Information Sources</title>
        <p>To identify original research papers and review papers on cybersecurity in health care systems published between 2012 and 2022, a total of 6 databases (Web of Science, ScienceDirect, Scopus, PubMed, Springer, and the Institute of Electrical and Electronics Engineers) and a journal (<italic>Management Information Systems Quarterly</italic>) were searched. Furthermore, bibliometric records such as website reports, white paper reports, and magazine reports that supported cybersecurity in health care were also collected for the review. As a means of verifying the papers identified in our search, we searched Google Scholar using a search string.</p>
      </sec>
      <sec>
        <title>Search Strategy</title>
        <p>The following search string and keywords were used: (“cybersecurity” OR “cybercrime OR ransomware”) AND (“health care”) OR (“cybersecurity in healthcare”). <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> provides more information.</p>
      </sec>
      <sec>
        <title>Data Extraction</title>
        <p>A total of 70 papers were extracted and recorded in a Microsoft Excel (Microsoft Corp) spreadsheet. The extracted data included information such as author or authors, year of publication, method, problem, and solution. The first author independently charted the data and updated the table to ensure the quality of the key findings drawn from the papers based on the recommendations of the second author. Critical appraisal was conducted to ensure the quality of evidence and the relevance of the articles. The data retrieved from the selected articles were analyzed.</p>
      </sec>
      <sec>
        <title>Data Synthesis</title>
        <p>The data from the literature were analyzed and synthesized using qualitative themes, which are presented in the following sections. The data were analyzed to identify the causes of vulnerabilities; solutions provided in the literature; and areas of classification based on sociotechnical, technical, and social perspectives in health care systems.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Selection of Sources of Evidence</title>
        <p>A total of 1257 papers were retrieved for the screening exercises. To determine whether the papers met our inclusion criteria regarding the topic domain, we began by scanning the abstracts and titles. The papers were reviewed by reading the full texts and determining their eligibility. Duplicated papers as well as those nonrelevant to cybersecurity, cybercrime, ransomware, and health care research were excluded. Furthermore, some papers were excluded after reading them in full and discovering that they were papers on research in progress. Finally, 70 papers were included in the analysis based on the eligibility criteria. <xref rid="figure1" ref-type="fig">Figure 1</xref> illustrates the selection process.</p>
        <p>The results of the SLR show the reasons why health care systems are vulnerable to cyberattacks and health care breaches. These reasons are the 5 vulnerability themes (<xref rid="figure2" ref-type="fig">Figure 2</xref> and <xref ref-type="table" rid="table1">Table 1</xref>). Furthermore, the 5 vulnerability themes were classified into social, technical, and sociotechnical approaches.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow diagram for paper selection.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46904_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Results and insight into health care system vulnerability.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46904_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Findings on health care system vulnerability categorized by themes and authors (N=70).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="350"/>
            <col width="150"/>
            <col width="150"/>
            <col width="350"/>
            <thead>
              <tr valign="top">
                <td>Vulnerabilities in health care</td>
                <td>Type of approach</td>
                <td>Studies, n (%)</td>
                <td>References</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Human error</td>
                <td>Social</td>
                <td>8 (11)</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Arndt [<xref ref-type="bibr" rid="ref39">39</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Twitter [<xref ref-type="bibr" rid="ref40">40</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Mukherjee [<xref ref-type="bibr" rid="ref41">41</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Ponemon Institute [<xref ref-type="bibr" rid="ref42">42</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>IBM Security [<xref ref-type="bibr" rid="ref43">43</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Scott and Wingfield [<xref ref-type="bibr" rid="ref44">44</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>He et al [<xref ref-type="bibr" rid="ref36">36</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Gordon et al [<xref ref-type="bibr" rid="ref45">45</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Old legacy systems</td>
                <td>Sociotechnical</td>
                <td>11 (16)</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Bouveret [<xref ref-type="bibr" rid="ref46">46</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>ECRI<sup>a</sup> Institute [<xref ref-type="bibr" rid="ref47">47</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sweeney [<xref ref-type="bibr" rid="ref16">16</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Faruki et al [<xref ref-type="bibr" rid="ref48">48</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins [<xref ref-type="bibr" rid="ref49">49</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Fu and Blum [<xref ref-type="bibr" rid="ref50">50</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Offner et al [<xref ref-type="bibr" rid="ref2">2</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>McHugh [<xref ref-type="bibr" rid="ref51">51</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Newman [<xref ref-type="bibr" rid="ref52">52</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Scott and Wingfield [<xref ref-type="bibr" rid="ref44">44</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Tully et al [<xref ref-type="bibr" rid="ref53">53</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Lack of investment</td>
                <td>Sociotechnical</td>
                <td>15 (21)</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Argaw et al [<xref ref-type="bibr" rid="ref11">11</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Emsisoft Malware Lab [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Branley-Bell et al [<xref ref-type="bibr" rid="ref56">56</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Information Commissioner’s Office, National Cyber Security Centre, and James M [<xref ref-type="bibr" rid="ref57">57</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Kaspersky Inc [<xref ref-type="bibr" rid="ref58">58</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>PCEB<sup>b</sup> [<xref ref-type="bibr" rid="ref59">59</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Rahman et al [<xref ref-type="bibr" rid="ref60">60</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Gkioulos and Chowdhury [<xref ref-type="bibr" rid="ref61">61</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Tully et al [<xref ref-type="bibr" rid="ref53">53</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Williams and Woodward [<xref ref-type="bibr" rid="ref34">34</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coventry et al [<xref ref-type="bibr" rid="ref62">62</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>He et al [<xref ref-type="bibr" rid="ref36">36</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali and Kaiser [<xref ref-type="bibr" rid="ref37">37</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Complex network-connected end-point devices</td>
                <td>Technical</td>
                <td>36 (51)</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Burns et al [<xref ref-type="bibr" rid="ref63">63</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Bouveret [<xref ref-type="bibr" rid="ref46">46</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Chua [<xref ref-type="bibr" rid="ref64">64</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coventry et al [<xref ref-type="bibr" rid="ref62">62</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Dameff et al [<xref ref-type="bibr" rid="ref8">8</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Dienna et al [<xref ref-type="bibr" rid="ref65">65</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>ECRI Institute [<xref ref-type="bibr" rid="ref47">47</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins [<xref ref-type="bibr" rid="ref49">49</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Francis [<xref ref-type="bibr" rid="ref66">66</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Frost [<xref ref-type="bibr" rid="ref3">3</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Twitter [<xref ref-type="bibr" rid="ref40">40</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Giansanti [<xref ref-type="bibr" rid="ref5">5</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Handa et al [<xref ref-type="bibr" rid="ref67">67</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Offner et al [<xref ref-type="bibr" rid="ref2">2</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Klonoff [<xref ref-type="bibr" rid="ref9">9</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lechner [<xref ref-type="bibr" rid="ref68">68</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lewis [<xref ref-type="bibr" rid="ref69">69</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lyon [<xref ref-type="bibr" rid="ref70">70</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>McHugh [<xref ref-type="bibr" rid="ref51">51</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Mohan [<xref ref-type="bibr" rid="ref71">71</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Newman [<xref ref-type="bibr" rid="ref52">52</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Baranchuk et al [<xref ref-type="bibr" rid="ref72">72</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Perakslis [<xref ref-type="bibr" rid="ref73">73</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Peterson [<xref ref-type="bibr" rid="ref74">74</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sajedi and Rahbar Yaghobi [<xref ref-type="bibr" rid="ref75">75</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Omotosho et al [<xref ref-type="bibr" rid="ref76">76</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Singh et al [<xref ref-type="bibr" rid="ref77">77</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sittig and Singh [<xref ref-type="bibr" rid="ref78">78</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Snell [<xref ref-type="bibr" rid="ref79">79</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Tully et al [<xref ref-type="bibr" rid="ref53">53</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Walker [<xref ref-type="bibr" rid="ref7">7</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Williams and Woodward [<xref ref-type="bibr" rid="ref34">34</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali and Kaiser [<xref ref-type="bibr" rid="ref37">37</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>He et al [<xref ref-type="bibr" rid="ref36">36</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Technology advancement (digitalization)</td>
                <td>Technical</td>
                <td>10 (14)</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Bhuyan et al [<xref ref-type="bibr" rid="ref80">80</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Karambelas [<xref ref-type="bibr" rid="ref4">4</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Kruse et al [<xref ref-type="bibr" rid="ref17">17</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Raina MacIntyre et al [<xref ref-type="bibr" rid="ref81">81</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins et al [<xref ref-type="bibr" rid="ref82">82</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>PECB Insights [<xref ref-type="bibr" rid="ref59">59</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Jalali et al [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Rodrigues et al [<xref ref-type="bibr" rid="ref83">83</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>ECRI: Emergency Care Research Institute.</p>
            </fn>
            <fn id="table1fn2">
              <p><sup>b</sup>PECB: Professional Evaluation and Certification Board.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The results also revealed that &#62;24% of the data breaches from all industry clusters originated in the health care sector alone (<xref ref-type="table" rid="table1">Table 1</xref>) [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref84">84</xref>]. Other studies highlighted that organizations tend to spend more money on procuring new technology while committing only ≤5% of their budgets to the security of their critical health care systems [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Cybercriminals exploit health care systems due to the lack of investment, technology advancement as a result of digitalization, human error due to a lack of awareness and training, and old legacy systems, which enable cybercriminals to access valuable health information and sell it on the dark web for money and other gains [<xref ref-type="bibr" rid="ref12">12</xref>]. The results reported a significant increase in data breaches and cyberattacks, with complex systems, IoMT devices, technology advancement, and network-connected end-point devices in complex connected heterogeneous health care systems identified as the major contributing factors.</p>
        <p>The studies also identified a shortage of cybersecurity skills to contain cyberattacks or threats to health care organizations and systems [<xref ref-type="bibr" rid="ref16">16</xref>]. The studies revealed that approximately 60% to 70% of health care organizations have witnessed breaches of health information without disclosure [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
      </sec>
      <sec>
        <title>Human Error</title>
        <p>Human error is a significant factor in the event of a cyberattack [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref22">22</xref>]. This shortcoming is one of the most crucial issues in health care systems as most cybercriminals use methods such as phishing to execute attacks with just a deceitful email. This is a social problem that can be addressed from a social approach. For example, human error posed a risk to the Geneva University Hospitals [<xref ref-type="bibr" rid="ref86">86</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> shows that 11% (8/70) of the studies acknowledged human error as the primary social reason for health care system vulnerability. Human error is attributed to a lack of skills and is a major trend in this ever-changing technological landscape, playing a role in several cybersecurity breaches [<xref ref-type="bibr" rid="ref56">56</xref>]. From a technological point of view, a lack of expertise from humans and threats from human-related events are responsible for &#62;70% of data fraud and breaches in business organizations (McCue, A, unpublished data, May 2008) [<xref ref-type="bibr" rid="ref80">80</xref>] because of the value of health information on the dark web [<xref ref-type="bibr" rid="ref6">6</xref>] and breaches in business organizations (McCue, A, unpublished data, May 2008) [<xref ref-type="bibr" rid="ref80">80</xref>]. Furthermore, human-related threats have recently emerged as a growing concern.</p>
      </sec>
      <sec>
        <title>Old Legacy Systems</title>
        <p>Old legacy systems have been the basis of system development from the dawn of the medical device, operating system, and embedded mobile device era. Legacy operating systems such as Windows ME, Windows 2000, MS-DOS, UNIX, and firmware provide the foundation for system development. However, these systems pose a significant threat to health care sectors and organizations in our current era. <xref ref-type="table" rid="table1">Table 1</xref> shows that 16% (11/70) of the studies acknowledged the vulnerability of health care systems to attacks due to old legacy systems. Such attacks occur from a sociotechnical approach, with cybercriminals exploiting humans and technology. Many data breaches, system incompatibilities, and security risks in health care systems and sectors are associated with legacy systems. Similarly, our SLR found that 85% of medical organizations use outdated operating systems or infrastructure [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Furthermore, Fu and Blum [<xref ref-type="bibr" rid="ref50">50</xref>] raised concerns about organizations relying on unsupported software, alluding to medical devices that run on Windows XP operating systems with service packs but lack security updates. In addition, the case of the National Health Service 2017 WannaCry malware, which interrupted health care operations and shut down numerous hospitals by infecting thousands of computers, was caused by Windows XP software [<xref ref-type="bibr" rid="ref87">87</xref>]. The authorities had been informed about the bugs but failed to act due to negligence. When a medical device is compromised, cybercriminals use it as a gateway to abuse hospitals, health care system networks, and health information or data. Perriello [<xref ref-type="bibr" rid="ref88">88</xref>] and Meggitt [<xref ref-type="bibr" rid="ref89">89</xref>] highlighted another issue, <italic>Medijack</italic>, referring to hackers hijacking medical devices to construct a back entrance into a hospital network. As a result, the use of a network of old legacy medical devices for administrative processes and care delivery increases the opportunities for an attacker or cybercriminal to easily intrude into hospital or health care organization networks and exploit and compromise the network of medical devices and health information. In this era of rapid medical technological advancement, health care systems also lack built-in security safeguards. Legacy systems do not support new technologies, and so the network of medical equipment in intensive care units, recovery rooms, operating rooms, and electronic health records (EHRs) will lack proper and secure communication and interoperability. Outdated legacy systems and unsupported operating systems are vulnerable to high-speed attacks. Furthermore, these problems are attributable to the lack of important updates to health care infrastructure. To support our point, health and human services should provide more guidance on applying the National Institute of Standards and Technology framework to the health care industry and consider appropriate incentives that would allow health care organizations to phase out old vulnerable legacy systems [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
      </sec>
      <sec>
        <title>Lack of Investment</title>
        <p>Investment in the health sector will yield better outcomes and quality health care delivery. According to our analysis and results, the health care sector suffers from underinvestment, and crucial infrastructure and training for health care cybersecurity are disregarded [<xref ref-type="bibr" rid="ref6">6</xref>], which is one of the primary causes of the increase in sensitive health information breaches. Investment can be seen in social (human) and technical (technology) aspects. As shown in the analysis in <xref ref-type="table" rid="table1">Table 1</xref>, a total of 21% (15/70) of the studies acknowledged the lack of investment and advised both directly and indirectly regarding the necessity of cybersecurity investment in the health care industry [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. The analysis acknowledged and revealed that the health care sector lagged more than other sectors in terms of health information protection and breaches. Furthermore, the findings of our SLR revealed that 80% to 85% of worldwide breaches occur in the health sector [<xref ref-type="bibr" rid="ref4">4</xref>], whereas 45% to 90% of health care organizations have witnessed one or more threats or breaches [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]. Investment in critical infrastructure for health care and best practices in cyber hygiene will aid in the protection of health care systems from potential vulnerabilities. Proper investment will ensure the safeguarding of personal information and render health care systems more resilient to cyberattacks.</p>
      </sec>
      <sec>
        <title>Complex Network-Connected End-Point Devices</title>
        <p>Medical end-point devices have long served as a hospital’s backbone for treatment, diagnosis, and precision-based technological applications to complement health care service operations and management. To fully exploit their potential, the medical device development pattern has shifted from traditional-based medical device system development to a network of wireless, connected end-point technological devices with built-in communications and remote connectivity. Complex network-connected end-point devices have increased the cyberattack surfaces in conjunction with their complexity and technological systems as heterogeneity in nature of medical technology has evolved. Complex network devices are classified as a technical challenge from the perspective of technical security system design. The analysis in <xref ref-type="table" rid="table1">Table 1</xref> shows that 51% (36/70) of the studies acknowledged network-connected end-point medical devices as the most significant technical reason for health care systems’ vulnerability to cyberattacks. The operational modes continue to evolve with more interconnections between new applications and devices such as cloud-based applications, third-party software, IoMT devices, and system networks in health care environments. Lechner [<xref ref-type="bibr" rid="ref68">68</xref>] revealed that original equipment manufacturers are now creating interconnected medical devices without incorporating proper cybersecurity features into the development life cycle of medical and end-point device systems. The vulnerability of the end point requires urgent attention; otherwise, cybercriminals will continue to use the weakness of connected devices to access personal health information. According to research and cybersecurity stakeholders, wearables, implanted devices, and sensors may become the new targets of future exploits [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. As shown in <xref ref-type="table" rid="table1">Table 1</xref>, complex network-connected end-point medical devices also require medical technology security by design [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref90">90</xref>] as a solution strategy to protect critical health care infrastructure from breaches. In the past, medical device system development has primarily focused on critical performance and safety. Furthermore, the security aspects of these medical devices are not a factor during the planning and development process. The process indicates that developing traditional or stand-alone systems of noninterconnected devices was a suitable method for designing the traditional approach. These are the current legacy systems that lack interoperability, updates, security design, or compatibility. Furthermore, connected medical devices such as sensor-controlled drug infusion pumps, cardiac pacemakers, pulse oximeters, and network-connected x-ray machine components such as picture archiving and communication systems are vulnerable to cybersecurity threats and attacks [<xref ref-type="bibr" rid="ref5">5</xref>]. To continue solving cybersecurity issues in medical devices, developers and actors must recognize the importance of the health care environment’s complex operations. In addition, there should be incident reports, an audit trail in the device system database, and paper-based documentation of technical vulnerabilities [<xref ref-type="bibr" rid="ref34">34</xref>]. Medical device manufacturers such as security experts or systems integrators must address this issue because, with a single cyber vulnerability, cybercriminals or hackers can exploit medical technology connected to the internet, compromising data integrity, wearable sensor readings, protected health information, patient safety, and care outcomes [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. When cyberattackers manipulate systems or deposit a virus, this could cause medical device software or systems to malfunction, resulting in abnormal effects or different readings from the systems, such as implantable medical devices that take and display incorrect readings [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref8">8</xref>].</p>
      </sec>
      <sec>
        <title>Technology Advancement (Digitalization)</title>
        <p>Technology advancement has enabled unique access and benefits to revolutionize health care systems in terms of precision. Modern medical care now relies on health care delivery organizations, including hospitals and clinics, built on a backbone of connected computer-based infrastructure. Over the past 30 years, the expansive integration of new health care technology has changed the face of medicine [<xref ref-type="bibr" rid="ref53">53</xref>]. However, the rapid digitalization in health care delivery, where medical devices are intertwined in a digital network setting and system to ensure the precision of health care delivery with the use of IoMT and digital devices, has created gateway access for cyberattacks, risks, and vulnerabilities [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> shows that 14% (10/70) of the studies acknowledged technology advancement due to digital transformation as the reason why health care systems are vulnerable to cyberattacks. This type of attack and vulnerability usually occur from the technical areas of cyberattacks, for example, a technology error such as glitches and design errors. One example of vulnerability is St. Joseph Hospital in California, where the health information of 31,800 patients was made public through a basic internet search engine for &#62;1 year without anyone noticing. The underlying issue was that security settings on the medical devices were not correctly configured [<xref ref-type="bibr" rid="ref91">91</xref>]. As technology continues to evolve, IoMT will become more inseparable in health care service delivery, which will create more vulnerabilities if health care organizations continue to disregard cybersecurity threats without proactive readiness to address them in this era of Industry 4.0. These vulnerabilities pose threats to the security and privacy of human and health information.</p>
        <p>Studies have shown the health care sector to be unequipped and lacking in investment [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref92">92</xref>]. For example, the use of electronic health technology, motivated by acts such as the Meaningful Use program introduced by the US government, has compelled many health care organizations to increase the use of digital technology in health care, such as EHRs and electronic data exchange, and comply with enhanced health care delivery management. Organizations began to focus on adopting new technology and spending less on security, creating part of the problem [<xref ref-type="bibr" rid="ref32">32</xref>]. Technological advancements and a federal policy mandate ultimatum are 2 of the causes noted in this SLR that have increased health care industry exposure to cyberattacks and breaches of health information [<xref ref-type="bibr" rid="ref17">17</xref>]. Therefore, an organization should have proper planning; be proactive instead of reactive; and ensure the protection of health technology, information, patient privacy, and security when implementing or adopting advanced technology [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref80">80</xref>]. One such process is to ensure that a medical technology statement of disclosure and liability is included during the procurement, integration, and adoption of a technology. Support services and maintenance during and after procurement and installation should be part of the procurement process. Furthermore, the device manufacturer should also consider security in product development planning. Digital technology should also have the capability to monitor and collate threats and patterns and log these in a risk assessment register for analysis and improvement or threat containment.</p>
      </sec>
      <sec>
        <title>Causes of Vulnerabilities in Health Care Systems</title>
        <p><xref rid="figure3" ref-type="fig">Figure 3</xref> shows the causes of vulnerabilities in health care systems, which complement the findings regarding health care vulnerability, and categorizes them accordingly. The following sections address these vulnerabilities.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Causes of vulnerabilities in health care systems.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46904_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>How Can Health Care Systems Be Protected?</title>
        <sec>
          <title>Overview</title>
          <p>This study summarizes how health care systems can be protected from cyber threats and cyberattacks and presented in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Health care system protection.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="200"/>
              <col width="350"/>
              <col width="190"/>
              <col width="0"/>
              <col width="230"/>
              <thead>
                <tr valign="top">
                  <td colspan="2">Health care vulnerability and description of challenges</td>
                  <td>Proposed solutions</td>
                  <td>References</td>
                  <td colspan="2">Health care cybersecurity sociotechnical areas of application</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="5">
                    <bold>Human error</bold>
                  </td>
                  <td>Social approach</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Information breaches and identity theft</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Inform human health office and owners of the data, train staff, learn to encrypt information, and have a backup plan and rollover system.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Tuttle [<xref ref-type="bibr" rid="ref93">93</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Insecure behavior</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Implement training.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Coventry et al [<xref ref-type="bibr" rid="ref62">62</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Cyber warfare</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Foster awareness and implementation of cyber hygiene.</p>
                      </list-item>
                      <list-item>
                        <p>Implement data encryption, network defense solutions, and protection of premises.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Mukherjee [<xref ref-type="bibr" rid="ref41">41</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Employee negligence and error</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Implement training, invest in new skills for staff, and launch awareness campaign.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>He et al [<xref ref-type="bibr" rid="ref36">36</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Cybersecurity ethical issues, such as the disclosure and use of health information without consent</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Seek patient consent and balance privacy and autonomy for health information and usability.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Loi et al [<xref ref-type="bibr" rid="ref94">94</xref>]</p>
                      </list-item>
                      <list-item>
                        <p>Christen et al [<xref ref-type="bibr" rid="ref95">95</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="5">
                    <bold>Old legacy systems</bold>
                  </td>
                  <td>Sociotechnical approach</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Interoperability issues and incompatible device challenges</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Procure modern devices to enable seamless synchronization of devices and networks.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>—<sup>a</sup></td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Interoperability issues</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Implement health policy, regulation compliance, and upgrades.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>—</td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Inability to update software and medical devices</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Phase out legacy systems.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Sweeney [<xref ref-type="bibr" rid="ref16">16</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="5">
                    <bold>Lack of investment</bold>
                  </td>
                  <td>Sociotechnical approach</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Disregard of health care cyber critical infrastructure</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Invest in cyber critical systems.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Kruse et al [<xref ref-type="bibr" rid="ref17">17</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Protect data, operations, and valuables</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Invest in cybersecurity protection mechanisms for sensitive activities.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>—</td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Design and device usability issues for processes and data security management</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Invest in human behavior, technology, and organizational processes.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Coles-Kemp and Williams [<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="5">
                    <bold>Complex network-connected end-point devices</bold>
                  </td>
                  <td>Technical approach</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Cyberattack on hospital health care systems</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Defend the hospital with network security solutions. Have a backup and a roll-back system. Ensure that all standard policy and comprehensive guidelines are in place and always train staff to respond.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Argaw et al [<xref ref-type="bibr" rid="ref11">11</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>In case network-connected medical devices through the IoMT<sup>b</sup> are exposed</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Protect devices through assessment and extreme network defender solutions. Encrypt networks.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Frost [<xref ref-type="bibr" rid="ref3">3</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Vulnerabilities due to sensor and IoT<sup>c</sup> devices</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Implement device simulation, security assessment, and extreme network defender solutions.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Dameff et al [<xref ref-type="bibr" rid="ref8">8</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Vulnerability of end-point devices</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Develop network and device security protection solutions.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Lewis [<xref ref-type="bibr" rid="ref69">69</xref>]</p>
                      </list-item>
                      <list-item>
                        <p>Singh Rayat et al [<xref ref-type="bibr" rid="ref77">77</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="5">
                    <bold>Technology advancement (digitalization)</bold>
                  </td>
                  <td>Technical approach</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Lack of security in medical devices and critical infrastructure</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Ensure that medical devices are designed with security before procurement and ensure that device manufacturers maintain and manage security.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Lechner [<xref ref-type="bibr" rid="ref68">68</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Health care big data protection challenges</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Secure life cycle model and encryption through blockchain.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Khaloufi et al [<xref ref-type="bibr" rid="ref97">97</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Health care system digitalization and medical device vulnerability</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Implement cyber hygiene and security in designing devices.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Digitalization and technology advancement vulnerability gap (digital dark alley) challenges</td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Update firewall installations and use a secure design approach, cloud recovery planning, and backup.</p>
                      </list-item>
                    </list>
                  </td>
                  <td>
                    <list list-type="bullet">
                      <list-item>
                        <p>Karambelas [<xref ref-type="bibr" rid="ref4">4</xref>]</p>
                      </list-item>
                    </list>
                  </td>
                  <td colspan="2">
                    <break/>
                  </td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table2fn1">
                <p><sup>a</sup>Not applicable.</p>
              </fn>
              <fn id="table2fn2">
                <p><sup>b</sup>IoMT: Internet of Medical Things.</p>
              </fn>
              <fn id="table2fn3">
                <p><sup>c</sup>IoT: Internet of Things.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Human-Related Case Type and Challenges</title>
          <p>The protection of health care systems from cyberattack-related vulnerabilities caused by human error, such as identity theft and health information breaches, requires by law that health care organizations inform the human health office, regulatory bodies, and data owners [<xref ref-type="bibr" rid="ref93">93</xref>] to ensure compliance with ethical and privacy standard regulations [<xref ref-type="bibr" rid="ref94">94</xref>,<xref ref-type="bibr" rid="ref95">95</xref>]. A security compliance officer should also be employed to guide and ensure that proper cyber hygiene measures are in place to avoid such occurrences. It is important to ensure that health information is encrypted to assure that data are unusable and back up data offline and on the web. Furthermore, in cases in which a health care organization is saddled with challenges due to insecure human behavior, such as employee negligence, a lack of skills, and cyber warfare, the organization must ensure proper training of all staff [<xref ref-type="bibr" rid="ref62">62</xref>] and implement awareness programs using a comprehensive guide to avert cyber threats [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. This proposed solution requires a social approach in designing guidelines and training programs.</p>
        </sec>
        <sec>
          <title>Old Legacy Systems Case Type and Challenges</title>
          <p>Interoperability and compatibility challenges in medical devices stem from human-related activities within health care systems, potentially impacting the persistence of outdated legacy systems [<xref ref-type="bibr" rid="ref50">50</xref>]. Therefore, to holistically protect health care systems, proposed solutions involve sociotechnical measures due to the old legacy in human work processes, organizational structures, and technology tasks, as mentioned by Offner et al [<xref ref-type="bibr" rid="ref2">2</xref>]. Organizations should adhere to policies and standards linked to the old legacy, ensure proper updates and upgrades, and implement patches. Modern equipment that supports security and carries out updates must be procured to avert crises and phase out legacy systems [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        </sec>
        <sec>
          <title>Lack of Investment Case Type and Challenges</title>
          <p>Investment in critical health care infrastructure is very important to ensure a health care ecosystem that is secure from cyberattacks and vulnerabilities. The susceptibility of health care to cyberattacks is a result of the underinvestment in and neglect of cybersecurity infrastructures. Kruse et al [<xref ref-type="bibr" rid="ref17">17</xref>] also highlighted that a health organization invests ≤5% in cybersecurity but tends to focus on integrating and delivering care. It is important for a health care organization to invest in technology, human behavior, and processes [<xref ref-type="bibr" rid="ref96">96</xref>] to protect sensitive and valuable health information from breaches and attacks.</p>
        </sec>
        <sec>
          <title>Complex Network-Connected End-Point Devices Case Type and Challenges</title>
          <p>The increase in health information breaches in hospitals is attributed to complex network-connected end-point devices, which are vulnerable to cyberattacks because sensor-based medical devices and system networks are interlinked and connected to the internet [<xref ref-type="bibr" rid="ref8">8</xref>]. Internet of Things devices are vulnerable because they can be controlled through a media access control address and network. A proposed solution identified in this SLR highlighted that health care can be protected though proper encryption of data and installation of network defenders [<xref ref-type="bibr" rid="ref3">3</xref>]. It is important that medical device simulation and assessment be performed through vulnerability analysis to ensure that devices are not tampered with or compromised [<xref ref-type="bibr" rid="ref8">8</xref>].</p>
        </sec>
        <sec>
          <title>Technology Advancement (Digitalization) Case Type and Challenges</title>
          <p>Technology advancement has revolutionized the health care delivery process using digital technological processes. Manufactured medical devices enable patients to be diagnosed remotely, and physicians can administer care using telemedicine. However, technological advancements still lack security in the design of these devices because security is an afterthought during development, which makes them vulnerable to cyberattacks [<xref ref-type="bibr" rid="ref5">5</xref>]. A proposed solution is that health care organizations must ensure that medical device security starts from the planning stage [<xref ref-type="bibr" rid="ref68">68</xref>] and that device manufacturers maintain and manage security in the pre- and postmarket phases. This solution paradigm must be catalogued as a technical measure. Hospitals with modern-day smart care should leverage comprehensive guidelines and compliance with standards such as those of the International Organization for Standardization or International Electrotechnical Commission 27001 or 27002, as well as cyber hygiene to enable effective and efficient care delivery processes [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Therefore, the implementation of solutions should always adopt a sociotechnical approach [<xref ref-type="bibr" rid="ref96">96</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Intervention Application Areas and Domain Counts for 2012 to 2022</title>
        <p>The selected studies from this SLR that discussed and presented knowledge interventions and solutions applied in some health care sectors between 2012 and 2022 are categorized and presented in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Intervention application areas and domain count for health care cybersecurity between 2012 and 2022 (N=70).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="260"/>
            <col width="0"/>
            <col width="290"/>
            <col width="0"/>
            <col width="420"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Vulnerability and knowledge application domain</td>
                <td colspan="2">Solution papers published in this domain between 2012 and 2022, n (%)</td>
                <td>References</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="6">
                  <bold>Human error</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Training</td>
                <td colspan="2">12 (17)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Karambelas [<xref ref-type="bibr" rid="ref4">4</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Giansanti [<xref ref-type="bibr" rid="ref5">5</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Dameff et al [<xref ref-type="bibr" rid="ref8">8</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Argaw et al [<xref ref-type="bibr" rid="ref11">11</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Bhuyan et al [<xref ref-type="bibr" rid="ref80">80</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Offner et al [<xref ref-type="bibr" rid="ref2">2</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Holst et al [<xref ref-type="bibr" rid="ref98">98</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Branley-Bell et al [<xref ref-type="bibr" rid="ref56">56</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Chowdhury and Gkioulos [<xref ref-type="bibr" rid="ref61">61</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Khando et al [<xref ref-type="bibr" rid="ref99">99</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coventry et al [<xref ref-type="bibr" rid="ref62">62</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Information Commissioner’s Office, National Cyber Security Centre, and James M [<xref ref-type="bibr" rid="ref57">57</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Awareness</td>
                <td colspan="2">4 (6)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Walker [<xref ref-type="bibr" rid="ref7">7</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins et al [<xref ref-type="bibr" rid="ref82">82</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Kaspersky Inc [<xref ref-type="bibr" rid="ref58">58</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>PCEB<sup>a</sup> [<xref ref-type="bibr" rid="ref59">59</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Education</td>
                <td colspan="2">2 (3)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Rahman et al [<xref ref-type="bibr" rid="ref60">60</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Francis [<xref ref-type="bibr" rid="ref66">66</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Intelligence information sharing</td>
                <td colspan="2">5 (7)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Bouveret [<xref ref-type="bibr" rid="ref46">46</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Winton [<xref ref-type="bibr" rid="ref100">100</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Dobuzinskis and Finkle [<xref ref-type="bibr" rid="ref101">101</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Scott and Wingfield [<xref ref-type="bibr" rid="ref44">44</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lewis [<xref ref-type="bibr" rid="ref69">69</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Old legacy systems</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Health policy and standards</td>
                <td colspan="2">25 (36)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sweeney [<xref ref-type="bibr" rid="ref16">16</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Bouveret [<xref ref-type="bibr" rid="ref46">46</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Newman [<xref ref-type="bibr" rid="ref52">52</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coles-Kemp and Williams [<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Snell [<xref ref-type="bibr" rid="ref79">79</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Emsisoft Malware Lab [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Kruse et al [<xref ref-type="bibr" rid="ref17">17</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Rajamäki and Pirinen [<xref ref-type="bibr" rid="ref90">90</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>The HIPAA<sup>b</sup> Journal [<xref ref-type="bibr" rid="ref13">13</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Hippa [<xref ref-type="bibr" rid="ref13">13</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Khaloufi et al [<xref ref-type="bibr" rid="ref97">97</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Tuttle [<xref ref-type="bibr" rid="ref93">93</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Perakslis [<xref ref-type="bibr" rid="ref73">73</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Ponemon Institute [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref85">85</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Tully et al [<xref ref-type="bibr" rid="ref53">53</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Bhuyan et al [<xref ref-type="bibr" rid="ref80">80</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Williams and Woodward [<xref ref-type="bibr" rid="ref34">34</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lechner [<xref ref-type="bibr" rid="ref68">68</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>McHugh [<xref ref-type="bibr" rid="ref51">51</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Burns et al [<xref ref-type="bibr" rid="ref63">63</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>ECRI<sup>c</sup> Institute [<xref ref-type="bibr" rid="ref47">47</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Loi et al [<xref ref-type="bibr" rid="ref94">94</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Information Commissioner’s Office, National Cyber Security Centre, and James M [<xref ref-type="bibr" rid="ref57">57</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Kaspersky Inc [<xref ref-type="bibr" rid="ref58">58</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>PCEB [<xref ref-type="bibr" rid="ref59">59</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Lack of investment</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Partnership</td>
                <td colspan="2">3 (4)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Baranchuk et al [<xref ref-type="bibr" rid="ref72">72</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Raina MacIntyre et al [<xref ref-type="bibr" rid="ref81">81</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Chua [<xref ref-type="bibr" rid="ref64">64</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Complex network-connected end-point devices</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Participatory design science (sociotechnical)</td>
                <td colspan="2">1 (1)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Coles-Kemp and Williams [<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Network security</td>
                <td colspan="2">16 (23)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Frost [<xref ref-type="bibr" rid="ref3">3</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sittig and Singh [<xref ref-type="bibr" rid="ref78">78</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Twitter [<xref ref-type="bibr" rid="ref40">40</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Arndt [<xref ref-type="bibr" rid="ref39">39</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Bickers et al [<xref ref-type="bibr" rid="ref102">102</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Ponemon Institute [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins [<xref ref-type="bibr" rid="ref49">49</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Williams and Woodward [<xref ref-type="bibr" rid="ref34">34</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Zorabedian [<xref ref-type="bibr" rid="ref103">103</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sajedi and Rahbar Yaghobi [<xref ref-type="bibr" rid="ref75">75</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Omotosho et al [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref104">104</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>ECRI Institute [<xref ref-type="bibr" rid="ref47">47</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Djenna et al [<xref ref-type="bibr" rid="ref65">65</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Mohan [<xref ref-type="bibr" rid="ref71">71</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Baranchuk et al [<xref ref-type="bibr" rid="ref72">72</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Singh et al [<xref ref-type="bibr" rid="ref77">77</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Encryption</td>
                <td colspan="2">4 (6)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Mukherjee [<xref ref-type="bibr" rid="ref41">41</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Filkins [<xref ref-type="bibr" rid="ref49">49</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Mohan [<xref ref-type="bibr" rid="ref71">71</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Singh et al [<xref ref-type="bibr" rid="ref77">77</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Technological advancement (digitalization)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Machine learning</td>
                <td colspan="2">8 (11)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Omotosho et al [<xref ref-type="bibr" rid="ref76">76</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Zarour et al [<xref ref-type="bibr" rid="ref12">12</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Khaloufi et al [<xref ref-type="bibr" rid="ref97">97</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Reshmi [<xref ref-type="bibr" rid="ref10">10</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Faruki et al [<xref ref-type="bibr" rid="ref48">48</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Handa et al [<xref ref-type="bibr" rid="ref67">67</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Chen et al [<xref ref-type="bibr" rid="ref105">105</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Sajedi and Rahbar Yaghobi [<xref ref-type="bibr" rid="ref75">75</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Blockchain</td>
                <td colspan="2">1 (1)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Bhuyan et al [<xref ref-type="bibr" rid="ref80">80</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Security by design</td>
                <td colspan="2">6 (9)</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lyon [<xref ref-type="bibr" rid="ref70">70</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Coles-Kemp and Williams [<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Lechner [<xref ref-type="bibr" rid="ref68">68</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Fu and Blum [<xref ref-type="bibr" rid="ref50">50</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Andrea [<xref ref-type="bibr" rid="ref74">74</xref>]</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>PECB: Professional Evaluation and Certification Board.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
            <fn id="table3fn3">
              <p><sup>c</sup>ECRI: Emergency Care Research Institute.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Knowledge Application Domains and Vulnerabilities</title>
        <p>The vulnerabilities listed in <xref ref-type="table" rid="table3">Table 3</xref> reveal that human error was associated with interventions linked to one of the knowledge application domains of training, awareness, education, and intelligence information sharing.</p>
        <sec>
          <title>Training</title>
          <p>Employee training is important to avoid human factors or error challenges in health care. <xref ref-type="table" rid="table3">Table 3</xref> shows the proposed solutions and interventions for training from 17% (12/70) of the studies. <xref rid="figure4" ref-type="fig">Figure 4</xref> shows that training emerged in 2018 at 1% and increased to its peak between 2019 and 2021. However, this finding suggests the need for cybersecurity training in health care to manage human vulnerability challenges. This need is supported by the literature highlighting the importance of cybersecurity skills and education for health care professionals [<xref ref-type="bibr" rid="ref16">16</xref>] and the need for investment in this area [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>Knowledge application areas and domain count for health care cybersecurity between 2012 and 2022.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46904_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Education</title>
          <p>The solutions presented regarding educational intervention were derived from 3% (2/70) of the studies (<xref ref-type="table" rid="table3">Table 3</xref>). <xref rid="figure4" ref-type="fig">Figure 4</xref> shows that educational solutions emerged in 2017 and declined until 2020, when studies on educational intervention emerged. This finding is supported by research that shows a lack of educational skills [<xref ref-type="bibr" rid="ref16">16</xref>]. Organizations must invest in educational training and skills to curb social and technical cybersecurity vulnerability in health care.</p>
        </sec>
        <sec>
          <title>Awareness</title>
          <p>A total of 6% (4/70) of the studies in <xref ref-type="table" rid="table3">Table 3</xref> presented solutions on awareness to address the vulnerability of human errors. This small number of studies has shown a decline and a lack of cybersecurity awareness program in health care systems. <xref rid="figure4" ref-type="fig">Figure 4</xref> similarly shows that cybersecurity awareness emerged in 2016 and reached its peak at 2 studies. This has been validated by previous studies that indicate a lack of awareness programs and training [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref62">62</xref>].</p>
        </sec>
        <sec>
          <title>Intelligence Information Sharing</title>
          <p><xref ref-type="table" rid="table3">Table 3</xref> also shows that intelligence information sharing was a solution investigated in 7% (5/70) of the studies. It can be seen that information sharing emerged in 2014 and declined in 2015 before re-emerging in 2017 and 2018 at the rate of 1 study each year. This finding also shows that health care organizations should collaborate in training and intelligence information sharing to address cybersecurity challenges in health care.</p>
          <p>The vulnerabilities listed in <xref ref-type="table" rid="table3">Table 3</xref> reveal that old legacy systems were associated with interventions linked to the knowledge application domain of health policy and standards.</p>
        </sec>
        <sec>
          <title>Health Policy and Standards</title>
          <p>The knowledge intervention analysis indicates that 36% (25/70) of the studies acknowledged and were linked to health policy and standards (<xref ref-type="table" rid="table3">Table 3</xref>). The analysis shows that governments and health care organizations have proposed more interventions or solutions regarding health policy and standards to regulate health care organizations. The policy studies shown in <xref rid="figure4" ref-type="fig">Figure 4</xref> emerged in 2014 and continued to increase to their peak in 2018. Policies such as the Health Insurance Portability and Accountability Act, the GDPR, and the Health Information Technology for Economic and Clinical Health Act to engineer has helped to mitigate data breaches and vulnerabilities in health care organizations in addressing old legacy systems to avoid sanctions and fines in case of breaches. However, full implementation or enforcement of day-to-day monitoring in hospitals or health care organizations remains challenging.</p>
          <p>The vulnerabilities listed in <xref ref-type="table" rid="table1">Table 1</xref> reveal that a lack of investment was associated with interventions linked to the knowledge application domain of partnership.</p>
        </sec>
        <sec>
          <title>Partnership</title>
          <p>Partnership is key to sustaining and protecting health care systems from cybersecurity vulnerability [<xref ref-type="bibr" rid="ref72">72</xref>]. When organizations fail to invest in critical cyber infrastructure, skills, and partnerships with governments and expert security organizations, it is likely that they will be vulnerable to cyberattacks and breaches of health information and lack the capability to protect health care systems from the vulnerability of underinvestment. <xref ref-type="table" rid="table3">Table 3</xref> shows that partnership solutions were provided in 4% (3/70) of the studies, whereas <xref rid="figure4" ref-type="fig">Figure 4</xref> shows that partnership emerged in 2018 and declined in 2021. There is a need for health care organizations to partner for better capability and structure to protect health care systems [<xref ref-type="bibr" rid="ref64">64</xref>].</p>
          <p>The vulnerabilities listed in <xref ref-type="table" rid="table1">Table 1</xref> reveal that complex network-connected end-point devices were associated with interventions linked to the knowledge application domains of participatory design, network security, and encryption.</p>
        </sec>
        <sec>
          <title>Participatory Design</title>
          <p>Health care organizations and medical device manufacturers must jointly participate in designing processes and systems to avoid a sociotechnical design gap. This collaboration will help protect health care systems and increase the acceptability of organizational systems and productivity. <xref ref-type="table" rid="table3">Table 3</xref> shows only 1 pertinent study in 2014. This infer that participatory design is one of the reasons for the vulnerabilities in complex network-connected end-point devices in health care systems. Health care systems comprise a complex environment that requires a sociotechnical and collaborative approach to addressing challenges [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
        </sec>
        <sec>
          <title>Network Security</title>
          <p>Network security solutions were covered in 23% (16/70) of the studies (<xref ref-type="table" rid="table3">Table 3</xref>). A number of intervention solution studies were conducted in this domain. As shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>, the first increase was observed in 2014 with 4 studies, a decline to 2 studies was observed in 2017, and then the number of studies increased to 3 before a final decline to 2 studies in 2021. These studies still attest to the vulnerability of complex network-connected end-point devices, which require increased interventions to solve health care vulnerability challenges.</p>
        </sec>
        <sec>
          <title>Encryption</title>
          <p>The encryption technological solution in this review was mentioned in 6% (4/70) of the studies. There was a limited number of solutions regarding encryption intervention in this review (<xref rid="figure4" ref-type="fig">Figure 4</xref>). Encryption only emerged in 2014 with 2 studies, and there was a gap in studies until 2017 and 2018. This finding shows that health care organizations need to implement encryption technology to protect valuable health information from breaches and attacks [<xref ref-type="bibr" rid="ref77">77</xref>].</p>
          <p>The vulnerabilities listed in <xref ref-type="table" rid="table1">Table 1</xref> reveal that technology advancement (digitalization) was associated with interventions linked to the knowledge application domains of machine learning, blockchain, and security design.</p>
        </sec>
        <sec>
          <title>Machine Learning</title>
          <p>Machine learning is a new area in which cybersecurity in health care systems is evolving. However, solutions were provided in only 11% (8/70) of the studies (<xref ref-type="table" rid="table3">Table 3</xref>). This technology surfaced in 2014 according to <xref rid="figure4" ref-type="fig">Figure 4</xref>. There was only 1 study in 2014 and 2015. No solutions were provided until 2018, and the number of interventions categorized under technology advancement increased from 2019 to 2021.</p>
        </sec>
        <sec>
          <title>Blockchain</title>
          <p>Blockchain technology is new and still lacking solutions according to this SLR, where only 1% (1/70) of the studies showed an effective intervention. Blockchain surfaced in 2019, as shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>. Additional solutions and interventions are needed as this area is promising and can be categorized under technology advancement (digitalization) as the key to protecting smart health care systems.</p>
        </sec>
        <sec>
          <title>Security by Design</title>
          <p>Security by design is a strategy that demands that health care organizations implement auto-based technology to protect digital health care systems. <xref ref-type="table" rid="table3">Table 3</xref> shows that 9% (6/70) of the studies acknowledged security by design as a solution for technology advancement to prevent vulnerability in digital systems. <xref rid="figure4" ref-type="fig">Figure 4</xref> shows studies on secure design in 2013 to 2014. There were no studies in 2015, whereas in 2016 to 2019, some studies provided interventions. There is a need for more solutions in this area to protect technological advancement or digital health care systems from vulnerability [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Summary of the Knowledge Application Domains and Vulnerabilities</title>
        <p>In summary, the findings of this SLR indicate that interventions provided for the containment of health care cybersecurity vulnerabilities were limited over the past 11 years. This SLR also revealed that interventions regarding the rate of technological advancements in addressing health care cybersecurity challenges were inconsistent and lagging between 2012 and 2022. Findings also indicates that interventions in some of the mapped variables were scarce between 2012 and 2022 (<xref ref-type="table" rid="table3">Table 3</xref>). Few or no solutions are provided to address the challenges in many domains regarding health care vulnerabilities.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Brief Summary of Findings</title>
        <p>This SLR provided a synthesis of literature on cybersecurity in health care and identified the reasons why health care systems are vulnerable to cyberattacks. This review analyzed 70 published studies and identified 5 vulnerability themes of cybersecurity in health care systems and also proposed sociotechnical solutions for health care organizations.</p>
        <p>The findings indicate that the extensive vulnerability of health care systems is due to internet-connected devices and software applications. Health care organizations face significant challenges, such as medical end-point device complexities and saturated wireless medical technology resulting in its difficulty in securing an interconnected technological landscape.</p>
        <p>Importantly, many cyberattacks occur within this interconnected network without the health care organization’s awareness, contributing to health information breaches.</p>
        <p>Our findings also underscore that the crucial role of investment in health care organizations is a key panacea for addressing cyberattacks and threats. Thus, lack of investment leverages the other vulnerabilities.</p>
        <p>In addition, this study found that lack of adequate preparation for the potential threats or vulnerability in shifting to the digitalization of health care is also a contributing factor to most successful cyberattacks on health care organizations.</p>
        <p>We found that human activity also played a major role in subjecting health care systems to cybercrimes. The decision of humans to develop medical devices, health software applications, management systems, and processes in an effective and secured manner is vital in safeguarding health information. However, there is a bit of disconnect in the human-centric design in health care system development, most importantly during the planning of procurement of medical technology and systems and the integration between health care organizations and stakeholders such as medical device developers, health care professionals, cybersecurity compliance officers, and system integration experts. Generally, the findings revealed that health care organizations lack adequate cybersecurity preparations during transitions to digitalization.</p>
        <p>The findings also revealed that the health care cybersecurity knowledge application domain areas in <xref rid="figure4" ref-type="fig">Figure 4</xref> depict that more intervention studies over the past 11 years were focused on health policy and standards.</p>
        <p>In <xref ref-type="table" rid="table4">Table 4</xref>, solutions are proposed from a sociotechnical perspective to counteract cybersecurity vulnerabilities in health care organizations.</p>
        <p>Further findings on the vulnerabilities and implications for future research are discussed in the following sections.</p>
        <p><xref ref-type="table" rid="table4">Table 4</xref> is an integrated table that is presented in a stand-alone view for health care system solutions from a sociotechnical viewpoint.</p>
        <p>To protect health care systems from attacks and vulnerabilities, as shown in <xref ref-type="table" rid="table4">Table 4</xref>, through the intervention of effective and noneffective studies, it can be seen that sociotechnical intervention studies classified invention most often and were the most effective. There are patterns and convergences between technical solutions and sociotechnical solutions in their domain of applications and solutions, such as a lack of investment, complex network-connected end-point devices, old legacy systems, and technology advancement, which lean toward interventions.</p>
        <p>While we can consider human errors in human-computer interactions and technology usability from a human perspective, design and management can be approached through a sociotechnical perspective [<xref ref-type="bibr" rid="ref96">96</xref>]. This approach also considers the final users of digital health care systems. Organizations would benefit from leveraging the sociotechnical solutions and guide in <xref ref-type="table" rid="table4">Table 4</xref> in the case of cyberattacks attributed to human error by training all staff to respond using a comprehensive guide to avert cyber threats [<xref ref-type="bibr" rid="ref62">62</xref>]. Challenges of technology, such as network-connected end-point devices and technology advancement for digitalization, should be addressed through network and security solutions and encryptions [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref67">67</xref>].</p>
        <p>Hospitals with modern-day smart care should leverage their comprehensive guidelines and standard International Organization for Standardization or International Electrotechnical Commission 27001 and 27002 compliances.</p>
        <p>Health care organizations should ensure and implement proper cyber hygiene to enable effective and efficient health care delivery processes [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. They should increase their budget for critical cyber systems to address the lack of investment [<xref ref-type="bibr" rid="ref17">17</xref>] and phase out old legacy systems by increasing investment. These actions will enable resilience and preparedness for future response plans and mitigations.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Health care system solutions from a sociotechnical viewpoint.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="30"/>
            <col width="250"/>
            <col width="0"/>
            <col width="230"/>
            <col width="0"/>
            <col width="270"/>
            <col width="0"/>
            <col width="190"/>
            <thead>
              <tr valign="top">
                <td colspan="4">Vulnerability, knowledge application domain, and description of challenge or case type</td>
                <td colspan="2">Sociotechnical lens</td>
                <td colspan="2">Effective</td>
                <td>Not effective</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="9">
                  <bold>Human error</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Training</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Ransomware or email phishing attack</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Train and educate health care staff to use encrypted solutions for data and virus risk register; stay up-to-date on trends of virus attacks for health care systems [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Review cyberattacks against hospitals worldwide via training workshops through teleconferences with experts; incorrect training approach and method of delivery via teleconference [<xref ref-type="bibr" rid="ref11">11</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Cyberattack on critical medical infrastructure and device breaches</p>
                    </list-item>
                    <list-item>
                      <p>Ineptitude of employees regarding cybersecurity in managing health records</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Train and educate clinicians through simulations of hacked medical devices for patient care to heighten their awareness [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Implement training for cybersecurity culture and proactive maturity resilience via human-computer interactions [<xref ref-type="bibr" rid="ref2">2</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Review cyberattacks against hospitals worldwide via training workshops through teleconferences with experts; incorrect training approach and method of delivery via teleconference [<xref ref-type="bibr" rid="ref11">11</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Insecure behavior of staff</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Social solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Assess behavior of health care staff regarding cybersecurity (insecure behavior) Apply AIDE<sup>a</sup> behavior change techniques to ensure secure behavior [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—<sup>b</sup></td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Health information attacks and identity theft</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2"><list list-type="bullet"><list-item><p>Provide employees with ISA<sup>c</sup> content development material and enhance and analyze security behavior in public and private sectors</p></list-item><list-item><p>Apply gamification</p></list-item><list-item><p>Develop prototype game and behaviorism theory and mental model for private-sector training</p></list-item></list>Apply real game and ANT<sup>d</sup> for public-sector training [<xref ref-type="bibr" rid="ref99">99</xref>]</td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Protection of health care system infrastructure</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement cybersecurity planning and training using the CERT RMM<sup>e</sup> [<xref ref-type="bibr" rid="ref79">79</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Low digital literacy skills of employees</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement essential and advanced digital literacy training via computers and smart devices [<xref ref-type="bibr" rid="ref98">98</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Awareness</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Inadequate cybersecurity awareness regarding the IoMT<sup>f</sup> devices</p>
                    </list-item>
                    <list-item>
                      <p>Lack of data protection compliance awareness</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Apply cross-situational awareness model of IoMT devices for employees and management [<xref ref-type="bibr" rid="ref7">7</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Provide awareness training on HIPPA<sup>g</sup> and GDPR<sup>h</sup> guidelines [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Education</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Employee cyberbullying</p>
                    </list-item>
                    <list-item>
                      <p>Hacking and vulnerabilities of medical devices</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Provide gamification education for web-based cyberbullies [<xref ref-type="bibr" rid="ref60">60</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Provide awareness and educational programs on the vulnerabilities of medical devices [<xref ref-type="bibr" rid="ref66">66</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Report on pacemaker hack that led to a disconnection based on a study; the study was generalized with speculation [<xref ref-type="bibr" rid="ref66">66</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Intelligence information sharing</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Notification alert of threat to critical infrastructure protection</p>
                    </list-item>
                    <list-item>
                      <p>Hospital management afraid to report data breach and cyberattack to protect their image</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Social solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement threat intelligence solution [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
                    </list-item>
                    <list-item>
                      <p>Recruit and contact compliance officer and information sharing center to report breach [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref100">100</xref>].</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Old legacy systems</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Health policy and standards</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>How can we manage cybersecurity vulnerability risks</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement cybersecurity risk framework [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Our devices lack updates</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Provide updates and patches for legacy systems [<xref ref-type="bibr" rid="ref57">57</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>What is the lasting solution for legacy systems</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Phase out legacy systems and procure devices with a security update that supports aftersales</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Curtailing health care breaches</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement GDPR and HITECH<sup>i</sup> policy for medical devices and data [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref85">85</xref>].</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Lack of Investment</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Partnership</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>We are concerned with the threat alerts for implanted cardiovascular medical devices.</p>
                    </list-item>
                    <list-item>
                      <p>Lack of support to manage implantable devices such as pacemakers</p>
                    </list-item>
                    <list-item>
                      <p>Managing threats with stakeholders to protect patients</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Ensure security in design from manufacturers and partners for aftersales support to ensure updates with remote monitoring or interrogation [<xref ref-type="bibr" rid="ref72">72</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Ensure a partnership for a safer cardiovascular implantable device with the manufacturer’s electronic device and follow FDA<sup>j</sup> and NIST-CSF<sup>k</sup> guidelines [<xref ref-type="bibr" rid="ref72">72</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Health care organization should partner and implement HICP<sup>l</sup> guidance [<xref ref-type="bibr" rid="ref64">64</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Developed new biosecurity risk methods and surveillance tools from traditional methods; they lack validation [<xref ref-type="bibr" rid="ref81">81</xref>]</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Complex network-connected end-point devices</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Participatory design science (sociotechnical)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Information security design gap challenges for health care systems</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Resolve information security design reality gap using the ITPOSOM<sup>m</sup> framework by Heeks [<xref ref-type="bibr" rid="ref96">96</xref>] and through collaboration [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Network security</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Insecurity of connected medical devices in protecting health information</p>
                    </list-item>
                    <list-item>
                      <p>Managing network security for IoMT devices</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Install extreme network defenders to secure the network and manage IoMT devices [<xref ref-type="bibr" rid="ref3">3</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Health record breaches in Australia are reportedly sold on the dark web; the study does not offer a solution [<xref ref-type="bibr" rid="ref102">102</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Attack on critical health care cyber infrastructure</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Develop a collaborative security approach and cybersecurity guidelines [<xref ref-type="bibr" rid="ref65">65</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Managing complex health care network access control and authentication</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Technical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement the attribute trust framework for aggregation of user attributes in a reputation system [<xref ref-type="bibr" rid="ref71">71</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Protection of EHRs<sup>n</sup> for patient safety challenge</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Apply the 3-phase e-PSG<sup>o</sup> framework [<xref ref-type="bibr" rid="ref78">78</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Encryption</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Protection of IoT<sup>p</sup> devices from breaches and being compromised</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Technical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Secure IoT devices through FHSS<sup>q</sup> and RSSI<sup>r</sup> techniques [<xref ref-type="bibr" rid="ref77">77</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Anthem’s insurance health record breach report; investigation revealed that a foreign government was behind the attack, which is speculation without evidence-based facts [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Managing cloud security concerns</p>
                    </list-item>
                    <list-item>
                      <p>Managing employee and patient devices on the health care network</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Assure investment and compliance with regulatory standards and monitoring</p>
                    </list-item>
                    <list-item>
                      <p>Implement policy on BYOD<sup>s</sup> and apply all-layer multifactor protections for cloud systems [<xref ref-type="bibr" rid="ref49">49</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Protecting sensitive health care data and exchange between the EHR and the cloud-based database</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Technical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Encrypt data using lightweight cryptographic protocols; store on the cloud-based PHR<sup>t</sup> [<xref ref-type="bibr" rid="ref71">71</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td colspan="9">
                  <bold>Technology advancement (digitalization)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Machine learning</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Protecting health care systems from ransomware and other malware attacks</p>
                    </list-item>
                    <list-item>
                      <p>Managing health care big data challenges</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Technical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement antimalware solutions using the dynamic method [<xref ref-type="bibr" rid="ref10">10</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Implement a big data life cycle model using blockchain [<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref97">97</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Adopting clusters to split the OCSVM<sup>u</sup> machine learning algorithm; however, the study does not offer a preventative solution [<xref ref-type="bibr" rid="ref67">67</xref>]</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Blockchain</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>How can we secure health information and personal identifiable information to enable privacy and security</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Technical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Implement information-hiding algorithms using blockchain technology [<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref97">97</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td colspan="8">
                  <bold>Secure design</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Formidable medical device protection</p>
                    </list-item>
                    <list-item>
                      <p>Protecting health care ecosystems</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Sociotechnical solution</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Build in security from design planning and compliance [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                    </list-item>
                    <list-item>
                      <p>Implement stakeholder collaborative design using sociotechnical behavior [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref96">96</xref>]</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Security trade-off on safer medical devices for patients with diabetes; proposed improvement plans are not yet implemented [<xref ref-type="bibr" rid="ref70">70</xref>]</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>AIDE: Assess, Identify, Develop, and Evaluate.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>Not applicable.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup>ISA: information security awareness.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>ANT: actor-network theory.</p>
            </fn>
            <fn id="table4fn5">
              <p><sup>e</sup>CERT RMM: Computer Emergency Response Team Resilience Management Model.</p>
            </fn>
            <fn id="table4fn6">
              <p><sup>f</sup>IoMT: Internet of Medical Things.</p>
            </fn>
            <fn id="table4fn7">
              <p><sup>g</sup>HIPAA: Health Insurance Portability and Accountability Act.</p>
            </fn>
            <fn id="table4fn8">
              <p><sup>h</sup>GDPR: General Data Protection Regulation.</p>
            </fn>
            <fn id="table4fn9">
              <p><sup>i</sup>HITECH: Health Information Technology for Economic and Clinical Health.</p>
            </fn>
            <fn id="table4fn10">
              <p><sup>j</sup>FDA: Food and Drug Administration.</p>
            </fn>
            <fn id="table4fn11">
              <p><sup>k</sup>NIST-CSF: National Institute of Standards and Technology Cybersecurity Framework.</p>
            </fn>
            <fn id="table4fn12">
              <p><sup>l</sup>HICP: Health Industry Cybersecurity Practices.</p>
            </fn>
            <fn id="table4fn13">
              <p><sup>m</sup>ITPOSOM: information, technology, processes, objectivity and values, skills and knowledge, management systems and structure, and other resources.</p>
            </fn>
            <fn id="table4fn14">
              <p><sup>n</sup>EHR: electronic health record.</p>
            </fn>
            <fn id="table4fn15">
              <p><sup>o</sup>e-PSG: electronic health record–specific patient safety goals.</p>
            </fn>
            <fn id="table4fn16">
              <p><sup>p</sup>IoT: Internet of Things.</p>
            </fn>
            <fn id="table4fn17">
              <p><sup>q</sup>FHSS: frequency-hopping spread spectrum.</p>
            </fn>
            <fn id="table4fn18">
              <p><sup>r</sup>RSSI: received signal strength indicator.</p>
            </fn>
            <fn id="table4fn19">
              <p><sup>s</sup>BYOD: bring your own device.</p>
            </fn>
            <fn id="table4fn20">
              <p><sup>t</sup>PHR: personal health record.</p>
            </fn>
            <fn id="table4fn21">
              <p><sup>u</sup>OCSVM: one-class support vector machine.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Implications for Future Research</title>
        <sec>
          <title>Overview</title>
          <p>Health care sectors have improved with policies and measures developed to control health information breaches and vulnerabilities. However, further research is needed in social and technical interception design, namely, the human factor. Managing complex end-point devices and investment on addressing health care vulnerability and breaches should be considered from a sociotechnical design and sustainability perspective.</p>
        </sec>
        <sec>
          <title>Protecting Complex Network-Connected End-Point Devices</title>
          <p>The protection of complex network-connected end-point devices for health care organizations involves several key measures. The network of interconnected medical end-point devices and the software systems that connect to the internet are becoming vulnerable to attacks and breaches. This is a growing issue; health care organizations tend to procure medical device technology without proper equipment planning and guidelines in place. This implies that security is overlooked and is not a major focus area. Examples include hospital beds connected to &#62;10 medical devices, such as pulse oximeters, syringe pumps, and patient care monitors, which are connected devices and vulnerable to attacks [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref6">6</xref>].</p>
          <p>To address this technical challenge, organizations can concentrate on developing advanced threat detection and mitigation techniques, such as network defenders tailored to intricate network-connected end-point devices in health care and the integration of artificial intelligence using machine learning algorithms to effectively identify and respond to emerging threats. Furthermore, the health care industry must take a sociotechnical approach [<xref ref-type="bibr" rid="ref96">96</xref>] toward implementing standard guidelines and technical solutions via the protection of health care networks through planning and integrating network security protection and segmentation. In addition, health information exchange over the network should undergo steganography and encryption as a solution using blockchain technology. Therefore, the integration of a complex end-point medical device should use built-in security with alert response and communication in processes to monitor health care cybersecurity ecosystems for a healthy security posture.</p>
          <p>Health care organizations should collaborate with security experts and health care professionals and implement user education and incidence response to catalog cyber vulnerability incidences for further analysis. The implication is that, if networks and end-point medical devices are not properly secured, this will lead to breaches of health information through the network, which will cause patient information to be hijacked by cybercriminals for political gains. Sponsored state actors may use this weakness to seize networks and systems of care delivery, demanding money from an organization before the latter can regain access. This approach will expose the health information of patients while they are receiving treatment and accessing health care services. This is an evolving challenge of the digital consequences of connected care. Building security through a design solution should be achieved from a sociotechnical approach as the human is the final user of systems of care.</p>
          <p>Future research should focus on security by design before integrations of complex technology and design a simpler flow process with the disaggregation of complex network connections.</p>
        </sec>
        <sec>
          <title>Increasing Investment in Cybersecurity</title>
          <p>Investment in health care systems is critical to ensure the proper safeguarding of health care ecosystems from cyberattacks and vulnerabilities. To ensure efficient and secure health care, organizations should invest in human capital and technology to function effectively. An evaluation through research reveals that health care is lagging behind other sectors in terms of investment. This finding was confirmed by Kruse et al [<xref ref-type="bibr" rid="ref17">17</xref>], who found that only 5% of health care investment is earmarked to protect health care, whereas a large percentage is allocated for health care delivery.</p>
          <p>Insufficient investment in cybersecurity experts, awareness, and investment partnership plans will continue to subject health care employees to insecure behavior and result in a health care organization that is unprepared to mitigate cyber threats and other tactics used by attackers to disrupt evolving health care trends and patterns, particularly ransomware attacks.</p>
          <p>Similarly, old legacy systems pose another security risk. Malicious actors can continue to exploit these systems to expose personal health information due to their limited capabilities and outdated organizational structure. Such vulnerability is worsened by a lack of investment in new cybersecurity infrastructure and computer devices to protect or process health information in a secure manner.</p>
          <p>Health care organizations can engage in partnership with medical technology providers, application developers, and network solution integrators to develop strong systems and structures with seamless integration. Health care organizations should also develop and implement a framework for prioritizing cybersecurity investment based on risk assessments and threat intelligence. This approach can help identify the most critical areas of vulnerability within different departments, aiding organizations and policy makers in directing investments where they are most needed. Health care organizations should invest in humans and technology through training to ensure the development of necessary skills and investment in critical cyber infrastructure.</p>
          <p>Awareness campaigns for patients and staff will help organizations recover from errors and breaches, whereas investment in technological security systems for health care will prepare health care organizations with the appropriate structure and system for resilience.</p>
          <p>The findings presented in this paper are also highlighted in <xref ref-type="table" rid="table4">Table 4</xref>. Investment challenges in health care cybersecurity should focus on a sociotechnical approach that involves human behavior, technology, and organizational processes and should not be segregated as a separate technical or social problem. Future research should focus on security and investment in smart health care for attaining sustainability and resilience.</p>
        </sec>
        <sec>
          <title>Managing Technological Advancement</title>
          <p>Health care industries and organizations have improved over the years and are continuing to forge the development of new capabilities, technological advances, and processes to manage the multifaceted challenges of health care cybersecurity. Complexity in technology advancement and networks of digital systems increase the number of attack surfaces, where cybercriminals take advantage of the digital gateway access and execute malicious software programmed with code, such as malware to compromise digital technology and health care system networks. However, technological development necessitates a proactive approach to cybersecurity, particularly when considering security-by-design principles.</p>
          <p>Future research projects must concentrate on important areas to protect networks, systems, and applications against vulnerabilities. Health care organizations should collaborate with medical device manufacturers as part of the planning phase of procurement requirements to ensure specifications needs before the development of medical devices technology for seamless integration. Implanted devices, for instance, should be built with security by design and continuously updated when necessary. A 2-factor authentication security for critical medical technology is also necessary. In addition, it is important that health care organizations quantify the risk, ensure that proper National Institute of Standards and Technology and GDPR standard guidelines are followed, and conduct threat modeling and simulation to evaluate the protectability of health care systems as a guideline in managing cybersecurity vulnerability.</p>
          <p>Collaborative (sociotechnical) efforts among academia, industry, and policy makers are essential to drive this research agenda forward and create a safer digital landscape for the future.</p>
          <p>The technology procurement requirement and collaboration should consider the integration of social and technical processes during digital technology development with health care delivery processes.</p>
          <p>Health care organizations can adopt a blockchain technology solution for the protection of health information and other applications such as EHR systems from malicious use and insider threats.</p>
          <p>Future research should examine the use of blockchain for health care big data protection and processes to manage cybersecurity vulnerability.</p>
        </sec>
        <sec>
          <title>Containing Human Error in Cybersecurity</title>
          <p>Humans are at the receiving end of the cyberattack chain. An example is the case of the WannaCry attack that affected 150,000 computers. It was attributed to human error because humans were warned of the attack on Windows server legacy systems but they ignored the warning by clicking on malicious email links [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. When an organization fails to train humans, cybercriminals take advantage of human weakness to exploit health care systems. Today, medical device manufacturers are building devices without considering humans as the final users or a participatory (sociotechnical) design approach. This is one factor of the clinical process and security dimension to protect critical infrastructure. Another factor is that, if a system is developed and does not start with security and support human usability, it becomes stressful for a human user to navigate the systems, which could cause them techno-stress, with the likelihood of mistakes. The health sector should use the Assess, Identify, Develop, and Evaluate technique to identify areas of human weakness, develop a new training method through simulations, and offer gamification training on issues such as phishing email deception and ransomware attacks. The implication is that, if humans are not trained, they will lead organizations to disaster because cybercriminals will continue to exploit the weakness of humans to cause more damage to health care systems. The consequences will include legal issues, fines, and possibly bankruptcy for health care organizations. Proper training and awareness campaigns should be implemented. Future research should focus on developing futuristic health care cybersecurity curriculums and training.</p>
        </sec>
      </sec>
      <sec>
        <title>Practical Implications</title>
        <p>Inadequate systems will cause health care systems and organizations to face increasing cyberattacks and setbacks in health information and patient safety. Moreover, a new trend reveals that, if implanted medical devices and technology are not protected, humans will be targeted by hackers seeking to make money or gain political power for ransom. However, implementation and adoption of the medical device security life cycle model [<xref ref-type="bibr" rid="ref68">68</xref>] will protect medical devices, health information, patients, and organizations from harm and against future emerging threats. Thus, there is a need for the design of a cybersecurity sociotechnical framework toward sustaining smart health care systems.</p>
      </sec>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>Previous narrative literature reviews by Coventry and Branley [<xref ref-type="bibr" rid="ref6">6</xref>] and Mohan et al [<xref ref-type="bibr" rid="ref31">31</xref>] highlight the need for an integrated approach in health care systems to address cybersecurity vulnerabilities. They emphasize the need for a comprehensive approach that connects human behavior, technology, and processes in a holistic way as a best strategy to tackle vulnerabilities, although the authors did not classify human behavior, technology, and processes from a sociotechnical lens. This systematic review supports their view by building and extending the literature on cybersecurity case challenge descriptions in all the tables in this paper to integrate human behavior, technology, and processes as a sociotechnical approach [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. For example, an SLR conducted by Offner et al [<xref ref-type="bibr" rid="ref2">2</xref>] reported that health care system vulnerability is a complex sociotechnical problem. Furthermore, for a health care organization to build resilience against cyberattacks and threats to avoid cybersecurity design gaps and vulnerabilities in the health care system, a strategic approach that integrates people, technology, and processes must be adopted [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]. The aforementioned aligns with the approach adopted in this study.</p>
        <p>Different schools of thought have highlighted the key importance of investment in technology and humans to protect health care systems from cyberattacks and threats [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. This corroborates our findings that cybersecurity investment plays a main role in health care systems.</p>
        <p>This study also revealed that complex network-connected end-point devices were mentioned several times by different schools of thought. Moreover, existing literature has opined that complex network-connected end-point devices were the most mentioned vulnerability [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref53">53</xref>].</p>
        <p>Furthermore, technology advancement through a digital transformation evolution has created precision, and managed health care delivery [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref94">94</xref>]. However, more effort is still required in designing security features in health care technology. This study highlighted that security by design is required for medical device technology in health care systems [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref68">68</xref>].</p>
        <p>Health care organizations must ensure that the design of technology evolves with a secure design approach from conception to avoid breaches of health information by external and internal attackers [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref68">68</xref>].</p>
        <p>The sociotechnical solutions in <xref ref-type="table" rid="table4">Table 4</xref> will aid health care organizations in being resilient in dealing with vulnerabilities and cybersecurity breaches in health care systems through a comprehensive and holistic approach. The sociotechnical perspective defines the meaning and constructs of technology, humans and processes [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. This approach is promising and effective in dealing with health care system and cybersecurity vulnerabilities.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>For this study, non–English-language articles on cybersecurity and health care were not included. Closed-access articles directly related to cybersecurity and health care were also not included. Textbooks linked to cybersecurity and health care were excluded. In addition, as cybersecurity is a broad topic, more time was needed for data analysis.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This study conducted an SLR (PRISMA guidelines) to investigate the body of literature on cybersecurity in health care systems because of the exponential increase in health information breaches and vulnerability issues surrounding medical device technology and networks. This study also examined why health care systems are vulnerable to cyberattacks and threats.</p>
        <p>In this review, sociotechnical solutions and mitigation strategies were proposed to protect patient health information, medical devices, and the critical cyber infrastructure of health care organizations from attacks and threats. We identified human error, lack of investment, complex network-connected end-point devices, old legacy systems, and technological advancement due to rapid digitalization as the causes of data breaches and the vulnerability of digital health care systems to attacks and threats. This study also revealed that research in the areas of education, awareness, training, collaborative partnerships, blockchain, and machine learning for health care cybersecurity is underrepresented. In addition, there was inconsistency in the publication of intervention studies. There is a gap in intervention studies published between 2012 and 2013, as shown in this SLR, as well as breaks in research publications between 2012 and 2022, as illustrated in <xref ref-type="table" rid="table3">Table 3</xref> and <xref rid="figure4" ref-type="fig">Figure 4</xref>.</p>
        <p>As shown in <xref ref-type="table" rid="table1">Table 1</xref>, of the 70 papers published between 2012 and 2022 and reviewed in this study, only 8 (11%) carried out research in the areas of human error–related perspectives where health care systems are vulnerable to attacks. This finding clearly shows that considerably more studies are required on human factors. We also identified from this review that network-connected end-point devices are the most vulnerable challenge that causes health information breaches. However, stakeholders have rolled out interventions in the areas of health policy, health care system support (network security), and training. The support and training target operational activities and health care delivery while investment in cybersecurity critical infrastructure is disregarded. Rapid technology advancement has resulted to an increasing risk of cyberattacks and threats because most manufactured connected medical devices were not built with security in mind. With the possible sociotechnical solutions in <xref ref-type="table" rid="table4">Table 4</xref>, we form conclusions about how to protect health care systems as a sociotechnical solution in relation to the gap in research on technology, human behavior, and processes.</p>
        <p>Health care organizations must concede that efficient and effective cybersecurity cannot be addressed with a technological process only but must also evolve beyond technological operation to a sociotechnical process that calls for a comprehensive knowledge of the human elements.</p>
        <p>The profound implication of our findings steps further from just the concept of security. It deems it necessary for a major change in the approach to health care security by shifting from a reactive measure of patching and mitigation toward an approach of proactiveness and integration of detailed mechanisms that depend on complex sociotechnical dynamics at play in the design and development processes across the health care systems.</p>
        <p>Our review emphasized the importance of a mandatory collaboration and cross-disciplinary engagement among stakeholders in health care, technology policy, and academia. The inclusion of a team-based effort from stakeholders will foster an integrated solution that responds to the challenges of cybersecurity vulnerabilities in health care systems.</p>
        <p>In addition, our findings also give prominence to the great significance of investment in health care systems, such as in cybersecurity technology, medical devices, networks, health care professionals, and cybersecurity professionals, in advancing health care organizations. Furthermore, investment is imperative in cybersecurity education and training programs that will provide health care professionals and organizations with the updated knowledge and skills to navigate the complexities of cybersecurity vulnerabilities constructively. Governments should provide additional financial incentives for health care organizations to facilitate cybersecurity sustainability in health care systems. Future research should explore the application of blockchain technology for safeguarding health care system data. Blockchain offers a secure decentralized architecture. Therefore, system developers should consider a human-centric design approach when integrating blockchain technology into health care systems.</p>
        <p>By strengthening awareness culture, intelligence information sharing, and accountability in health care systems, health care organizations can equip their operations and workforce to become active front-runners in safeguarding patient data and health care critical infrastructure and assuring the confidentiality, availability, and integrity of health care systems. Consequently, our SLR implores for an exhaustive procedure regarding cybersecurity in health care that affirms and entwines the sociotechnical nature of the vulnerabilities and challenges. By merging a technical approach with human-centric strategies, health care organizations can protect health care systems from vulnerabilities and cyber threats and advance a culture of resilience, trust, and innovation in health care service delivery. The implications of this review present a sociotechnical solution for establishing more secure and resilient health care ecosystems. This paper provides health care organizations with a better understanding of and resilience to cyberattacks, threats, and vulnerabilities.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist guide.</p>
        <media xlink:href="jmir_v26i1e46904_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 118 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Search strategy.</p>
        <media xlink:href="jmir_v26i1e46904_app2.docx" xlink:title="DOCX File , 15 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IoMT</term>
          <def>
            <p>Internet of Medical Things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">RQ</term>
          <def>
            <p>research question</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SLR</term>
          <def>
            <p>systematic literature review</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The author is grateful to the Finnish Cultural Foundation and University of Vaasa in Finland for their support in funding this research.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>Cybersecurity in healthcare</article-title>
          <source>Health Insurance Portability and Accountability Act</source>
          <access-date>2024-05-05</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.himss.org/resources/cybersecurity-healthcare">https://www.himss.org/resources/cybersecurity-healthcare</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Offner</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Sitnikova</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Joiner</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>MacIntyre</surname>
              <given-names>CR</given-names>
            </name>
          </person-group>
          <article-title>Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation</article-title>
          <source>Intell National Secur</source>
          <year>2020</year>
          <month>04</month>
          <day>22</day>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>556</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/02684527.2020.1752459"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/02684527.2020.1752459</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Frost</collab>
          </person-group>
          <article-title>Medical Device and Network Security Coming to terms with the Internet of Medical Things (IoMT)</article-title>
          <source>-</source>
          <year>2024</year>
          <fpage>2019</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://channelbytes.com/wp-content/uploads/2022/02/Medical-Device-and-Network-Security_-Coming-to-terms-with-the-Internet-of-Medical-Things-IoMT.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karambelas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Healthcare care technology: ransomware risk and protection</article-title>
          <source>Am Bankruptcy Inst J</source>
          <year>2020</year>
          <month>5</month>
          <volume>39</volume>
          <issue>5</issue>
          <fpage>30</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Giansanti</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity and the digital-health: the challenge of this millennium</article-title>
          <source>Healthcare (Basel)</source>
          <year>2021</year>
          <month>01</month>
          <day>11</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>62</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=healthcare9010062"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/healthcare9010062</pub-id>
          <pub-id pub-id-type="medline">33440612</pub-id>
          <pub-id pub-id-type="pii">healthcare9010062</pub-id>
          <pub-id pub-id-type="pmcid">PMC7827661</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: a narrative review of trends, threats and ways forward</article-title>
          <source>Maturitas</source>
          <year>2018</year>
          <month>07</month>
          <volume>113</volume>
          <fpage>48</fpage>
          <lpage>52</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://core.ac.uk/reader/157854043?utm_source=linkout"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.maturitas.2018.04.008</pub-id>
          <pub-id pub-id-type="medline">29903648</pub-id>
          <pub-id pub-id-type="pii">S0378-5122(18)30165-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Interoperability a must for hospitals, but it comes with risks</article-title>
          <source>Managed Healthcare Executive</source>
          <year>2017</year>
          <month>12</month>
          <day>10</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.managedhealthcareexecutive.com/view/interoperability-must-hospitals-it-comes-risks">https://www.managedhealthcareexecutive.com/view/interoperability-must-hospitals-it-comes-risks</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dameff</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Selzer</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Killeen</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Tully</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Clinical cybersecurity training through novel high-fidelity simulations</article-title>
          <source>J Emerg Med</source>
          <year>2019</year>
          <month>02</month>
          <volume>56</volume>
          <issue>2</issue>
          <fpage>233</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jemermed.2018.10.029"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jemermed.2018.10.029</pub-id>
          <pub-id pub-id-type="medline">30553562</pub-id>
          <pub-id pub-id-type="pii">S0736-4679(18)31055-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klonoff</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity for connected diabetes devices</article-title>
          <source>J Diabetes Sci Technol</source>
          <year>2015</year>
          <month>04</month>
          <day>16</day>
          <volume>9</volume>
          <issue>5</issue>
          <fpage>1143</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25883162"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1932296815583334</pub-id>
          <pub-id pub-id-type="medline">25883162</pub-id>
          <pub-id pub-id-type="pii">1932296815583334</pub-id>
          <pub-id pub-id-type="pmcid">PMC4667325</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reshmi</surname>
              <given-names>TR</given-names>
            </name>
          </person-group>
          <article-title>Information security breaches due to ransomware attacks - a systematic literature review</article-title>
          <source>Int J Inf Manag Data Insights</source>
          <year>2021</year>
          <month>11</month>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>100013</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.jjimei.2021.100013"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jjimei.2021.100013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Argaw</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Bempong</surname>
              <given-names>NE</given-names>
            </name>
            <name name-style="western">
              <surname>Eshaya-Chauvin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Flahault</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2019</year>
          <month>01</month>
          <day>11</day>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>10</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-018-0724-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-018-0724-5</pub-id>
          <pub-id pub-id-type="medline">30634962</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-018-0724-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC6330387</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zarour</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Alenezi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ansari</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Pandey</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Agrawal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Ensuring data integrity of healthcare information in the era of digital health</article-title>
          <source>Healthc Technol Lett</source>
          <year>2021</year>
          <month>06</month>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>66</fpage>
          <lpage>77</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34035927"/>
          </comment>
          <pub-id pub-id-type="doi">10.1049/htl2.12008</pub-id>
          <pub-id pub-id-type="medline">34035927</pub-id>
          <pub-id pub-id-type="pii">HTL212008</pub-id>
          <pub-id pub-id-type="pmcid">PMC8136763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <article-title>What are the penalties for HIPAA violations?</article-title>
          <source>The HIPAA Journal</source>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hipaajournal.com/what-are-the-penalties-for-hipaa-violations-7096/">https://www.hipaajournal.com/what-are-the-penalties-for-hipaa-violations-7096/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mcnulty</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kettani</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>On cybersecurity education for non-technical learners</article-title>
          <source>Proceedings of the 3rd International Conference on Information and Computer Technologies (ICICT)</source>
          <year>2020</year>
          <conf-name>ICICT 2020</conf-name>
          <conf-date>March 9-12, 2020</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/ICICT50521.2020.00072"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/icict50521.2020.00072</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ricci</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Breitinger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Baggili</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Survey results on adults and cybersecurity education</article-title>
          <source>Educ Inf Technol</source>
          <year>2018</year>
          <month>7</month>
          <day>11</day>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>231</fpage>
          <lpage>49</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s10639-018-9765-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10639-018-9765-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sweeney</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Healthcare data breaches haven’t slowed down in 2017, and insiders are mostly to blame</article-title>
          <source>Fierce Healthcare</source>
          <year>2017</year>
          <month>8</month>
          <day>3</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/yn2m49y8">https://tinyurl.com/yn2m49y8</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kruse</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Frederick</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Monticone</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: a systematic review of modern threats and trends</article-title>
          <source>Technol Health Care</source>
          <year>2017</year>
          <month>02</month>
          <day>21</day>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3233/THC-161263"/>
          </comment>
          <pub-id pub-id-type="doi">10.3233/thc-161263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wasserman</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wasserman</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Hospital cybersecurity risks and gaps: review (for the non-cyber professional)</article-title>
          <source>Front Digit Health</source>
          <year>2022</year>
          <volume>4</volume>
          <fpage>862221</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/36033634"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fdgth.2022.862221</pub-id>
          <pub-id pub-id-type="medline">36033634</pub-id>
          <pub-id pub-id-type="pmcid">PMC9403058</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Razak</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Perakslis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Madnick</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Health care and cybersecurity: bibliometric analysis of the literature</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>02</month>
          <day>15</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>e12644</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/2/e12644/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12644</pub-id>
          <pub-id pub-id-type="medline">30767908</pub-id>
          <pub-id pub-id-type="pii">v21i2e12644</pub-id>
          <pub-id pub-id-type="pmcid">PMC6396074</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
          <article-title>Healthcare data breach statistics</article-title>
          <source>The HIPAA Journal</source>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hipaajournal.com/healthcare-data-breach-statistics/#:~:text=2021%20was%20a%20bad%20year,stolen%2C%20or%20otherwise%20impermissibly%20disclosed">https://www.hipaajournal.com/healthcare-data-breach-statistics/#:~:text=2021%20was%20a%20bad%20year,stolen%2C%20or%20otherwise%20impermissibly%20disclosed</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
          <article-title>IBM report: cost of a data breach hits record high during pandemic</article-title>
          <source>IBM</source>
          <year>2021</year>
          <month>7</month>
          <day>28</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/euc26j9y">https://tinyurl.com/euc26j9y</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nifakos</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chandramouli</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nikolaou</surname>
              <given-names>CK</given-names>
            </name>
            <name name-style="western">
              <surname>Papachristou</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Koch</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Panaousis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bonacina</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Influence of human factors on cyber security within healthcare organisations: a systematic review</article-title>
          <source>Sensors (Basel)</source>
          <year>2021</year>
          <month>07</month>
          <day>28</day>
          <volume>21</volume>
          <issue>15</issue>
          <fpage>5119</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s21155119"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s21155119</pub-id>
          <pub-id pub-id-type="medline">34372354</pub-id>
          <pub-id pub-id-type="pii">s21155119</pub-id>
          <pub-id pub-id-type="pmcid">PMC8348467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heeks</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Health information systems: failure, success and improvisation</article-title>
          <source>Int J Med Inform</source>
          <year>2006</year>
          <month>02</month>
          <volume>75</volume>
          <issue>2</issue>
          <fpage>125</fpage>
          <lpage>37</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.ijmedinf.2005.07.024"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2005.07.024</pub-id>
          <pub-id pub-id-type="medline">16112893</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(05)00125-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Casola</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>De Benedictis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Villano</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Security-by-design in multi-cloud applications: an optimization approach</article-title>
          <source>Inf Sci</source>
          <year>2018</year>
          <month>07</month>
          <volume>454-455</volume>
          <fpage>344</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.ins.2018.04.081"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ins.2018.04.081</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <article-title>Secure-by-design: shifting the balance of cybersecurity risk: principles and approaches for secure by design software</article-title>
          <source>Cybersecurity and Infrastructure Security Agency</source>
          <year>2023</year>
          <month>10</month>
          <day>25</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cisa.gov/resources-tools/resources/secure-by-design">https://www.cisa.gov/resources-tools/resources/secure-by-design</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mumford</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The story of socio‐technical design: reflections on its successes, failures and potential</article-title>
          <source>Inf Syst J</source>
          <year>2006</year>
          <month>09</month>
          <day>04</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>317</fpage>
          <lpage>42</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/j.1365-2575.2006.00221.x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/j.1365-2575.2006.00221.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Palvia</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Conrath</surname>
              <given-names>DW</given-names>
            </name>
          </person-group>
          <article-title>A socio-technical framework for quality assessment of computer information systems</article-title>
          <source>Ind Manag Data Syst</source>
          <year>2001</year>
          <volume>101</volume>
          <issue>5</issue>
          <fpage>237</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1108/02635570110394635"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/02635570110394635</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atkinson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Eldabi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Paul</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pouloudi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Investigating integrated socio-technical approaches to health informatics</article-title>
          <source>Proceedings of the 34th Annual Hawaii International Conference on System Sciences</source>
          <year>2001</year>
          <conf-name>HICSS 2001</conf-name>
          <conf-date>January 6, 2001</conf-date>
          <conf-loc>Maui, HI</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/HICSS.2001.926578"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/hicss.2001.926578</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Informatics in the care of patients: ten notable challenges</article-title>
          <source>West J Med</source>
          <year>1997</year>
          <month>02</month>
          <volume>166</volume>
          <issue>2</issue>
          <fpage>118</fpage>
          <lpage>22</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/9109328"/>
          </comment>
          <pub-id pub-id-type="medline">9109328</pub-id>
          <pub-id pub-id-type="pmcid">PMC1304028</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coiera</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Four rules for the reinvention of health care</article-title>
          <source>BMJ</source>
          <year>2004</year>
          <month>05</month>
          <day>15</day>
          <volume>328</volume>
          <issue>7449</issue>
          <fpage>1197</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/15142933"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.328.7449.1197</pub-id>
          <pub-id pub-id-type="medline">15142933</pub-id>
          <pub-id pub-id-type="pii">328/7449/1197</pub-id>
          <pub-id pub-id-type="pmcid">PMC411109</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mohan</surname>
              <given-names>DN</given-names>
            </name>
            <name name-style="western">
              <surname>Gowda</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Vikyath</surname>
              <given-names>IS</given-names>
            </name>
          </person-group>
          <article-title>Cyber security in health care</article-title>
          <source>Int J Res Eng Sci Manag</source>
          <year>2020</year>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>551</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.47607/ijresm</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Luna</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rhine</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Myhra</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sullivan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kruse</surname>
              <given-names>CS</given-names>
            </name>
          </person-group>
          <article-title>Cyber threats to health information systems: a systematic review</article-title>
          <source>Technol Health Care</source>
          <year>2016</year>
          <month>01</month>
          <day>27</day>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3233/THC-151102"/>
          </comment>
          <pub-id pub-id-type="doi">10.3233/thc-151102</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Razak</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
          </person-group>
          <article-title>EARS to cyber incidents in health care</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>01</month>
          <day>01</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>81</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30517701"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocy148</pub-id>
          <pub-id pub-id-type="medline">30517701</pub-id>
          <pub-id pub-id-type="pii">5229203</pub-id>
          <pub-id pub-id-type="pmcid">PMC7647158</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Woodward</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem</article-title>
          <source>Med Devices Evid Res</source>
          <year>2015</year>
          <month>07</month>
          <volume>8</volume>
          <fpage>305</fpage>
          <lpage>16</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.2147/MDER.S50048"/>
          </comment>
          <pub-id pub-id-type="doi">10.2147/mder.s50048</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Safavi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Meer</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Melanie</surname>
              <given-names>EK</given-names>
            </name>
            <name name-style="western">
              <surname>Shukur</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Cyber vulnerabilities on smart healthcare, review and solutions</article-title>
          <source>Proceedings of the Cyber Resilience Conference (CRC)</source>
          <year>2018</year>
          <conf-name>CR 2018</conf-name>
          <conf-date>November 13-15, 2018</conf-date>
          <conf-loc>Putrajaya, Malaysia</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/CR.2018.8626826"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/cr.2018.8626826</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>He</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Aliyu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>04</month>
          <day>20</day>
          <volume>23</volume>
          <issue>4</issue>
          <fpage>e21747</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/4/e21747/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/21747</pub-id>
          <pub-id pub-id-type="medline">33764885</pub-id>
          <pub-id pub-id-type="pii">v23i4e21747</pub-id>
          <pub-id pub-id-type="pmcid">PMC8059789</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Kaiser</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in hospitals: a systematic, organizational perspective</article-title>
          <source>J Med Internet Res</source>
          <year>2018</year>
          <month>05</month>
          <day>28</day>
          <volume>20</volume>
          <issue>5</issue>
          <fpage>e10059</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2018/5/e10059/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10059</pub-id>
          <pub-id pub-id-type="medline">29807882</pub-id>
          <pub-id pub-id-type="pii">v20i5e10059</pub-id>
          <pub-id pub-id-type="pmcid">PMC5996174</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Page</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Bossuyt</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Boutron</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffmann</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Mulrow</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Shamseer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Brennan</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Glanville</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Grimshaw</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Hróbjartsson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lalu</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Loder</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Mayo-Wilson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McGuinness</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Welch</surname>
              <given-names>VA</given-names>
            </name>
            <name name-style="western">
              <surname>Whiting</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title>
          <source>BMJ</source>
          <year>2021</year>
          <month>03</month>
          <day>29</day>
          <volume>372</volume>
          <fpage>n71</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=33782057"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.n71</pub-id>
          <pub-id pub-id-type="medline">33782057</pub-id>
          <pub-id pub-id-type="pmcid">PMC8005924</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arndt</surname>
              <given-names>RZ</given-names>
            </name>
          </person-group>
          <article-title>For epic, interoperability comes from within</article-title>
          <source>Modern Healthcare</source>
          <year>2018</year>
          <month>1</month>
          <day>29</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.modernhealthcare.com/article/20180130/NEWS/180139993/for-epic-interoperability-comes-from-within">https://www.modernhealthcare.com/article/20180130/NEWS/180139993/for-epic-interoperability-comes-from-within</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <article-title>Incident detection, email attacks continue to cause headaches for companies</article-title>
          <source>Twitter</source>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://twitter.com/SandraProske/status/967893399599796224">https://twitter.com/SandraProske/status/967893399599796224</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mukherjee</surname>
              <given-names>SY</given-names>
            </name>
          </person-group>
          <article-title>Anthem’s historic 2015 health records breach was likely ordered by a foreign government</article-title>
          <source>Fortune</source>
          <year>2017</year>
          <month>1</month>
          <day>10</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://fortune.com/2017/01/09/anthem-cyber-attack-foreign-government/">https://fortune.com/2017/01/09/anthem-cyber-attack-foreign-government/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <article-title>2017 cost of data breach study: United States</article-title>
          <source>Ponemon Institute</source>
          <year>2017</year>
          <month>6</month>
          <day>13</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ponemon.org/news-updates/blog/security/2017-cost-of-data-breach-study-united-states.html">https://www.ponemon.org/news-updates/blog/security/2017-cost-of-data-breach-study-united-states.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <article-title>Cost of a data breach report 2021</article-title>
          <source>IBM Security</source>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://info.techdata.com/rs/946-OMQ-360/images/Cost_of_a_Data_Breach_Report_2021.PDF">https://info.techdata.com/rs/946-OMQ-360/images/Cost_of_a_Data_Breach_Report_2021.PDF</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wingfield</surname>
              <given-names>n</given-names>
            </name>
          </person-group>
          <article-title>Hacking attack has security experts scrambling to contain fallout</article-title>
          <source>New York Times</source>
          <year>2017</year>
          <month>5</month>
          <day>13</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/4weatd6e">https://tinyurl.com/4weatd6e</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Glynn</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kadakia</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mazzone</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Leinbach</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>06</month>
          <day>01</day>
          <volume>26</volume>
          <issue>6</issue>
          <fpage>547</fpage>
          <lpage>52</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30861069"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz005</pub-id>
          <pub-id pub-id-type="medline">30861069</pub-id>
          <pub-id pub-id-type="pii">5376646</pub-id>
          <pub-id pub-id-type="pmcid">PMC6515532</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bouveret</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cyber risk for the financial sector: a framework for quantitative assessment</article-title>
          <source>SSRN</source>
          <comment>Preprint posted online July 16, 2018</comment>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3203026"/>
          </comment>
          <pub-id pub-id-type="doi">10.2139/ssrn.3203026</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <article-title>Top 10 health technology hazards for 2016</article-title>
          <source>ECRI Institute</source>
          <year>2015</year>
          <month>11</month>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ecri.org/Resources/Whitepapers_and_reports/2016_Top_10_Hazards_Executive_Brief.pdf">https://www.ecri.org/Resources/Whitepapers_and_reports/2016_Top_10_Hazards_Executive_Brief.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faruki</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bharmal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Laxmi</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Ganmoor</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Singh Gaur</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Conti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rajarajan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Android security: a survey of issues, malware penetration, and defenses</article-title>
          <source>IEEE Commun Surv Tutorials</source>
          <year>2015</year>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>998</fpage>
          <lpage>1022</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/COMST.2014.2386139"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/comst.2014.2386139</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Filkins</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Health care cyberthreat report: widespread compromises detected, compliance nightmare on horizon</article-title>
          <source>SANS Institute</source>
          <year>2014</year>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://asprtracie.hhs.gov/technical-resources/resource/3381/health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-on-horizon">https://asprtracie.hhs.gov/technical-resources/resource/3381/health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-on-horizon</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Blum</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Controlling for cybersecurity risks of medical device software</article-title>
          <source>Commun ACM</source>
          <year>2013</year>
          <month>10</month>
          <volume>56</volume>
          <issue>10</issue>
          <fpage>35</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2508701"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2508701</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McHugh</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Medical device software and technology: the past, present and future</article-title>
          <source>BEAI Spectrum, Biological and Clinical Engineers Association of Ireland</source>
          <year>2015</year>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arrow.tudublin.ie/scschcomart/38/">https://arrow.tudublin.ie/scschcomart/38/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>LH</given-names>
            </name>
          </person-group>
          <article-title>Medical devices are the next security nightmare</article-title>
          <source>WIRED</source>
          <year>2017</year>
          <month>3</month>
          <day>2</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">https://www.wired.com/2017/03/medical-devices-next-security-nightmare/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tully</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Selzer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>O'Connor</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dameff</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Healthcare challenges in the era of cybersecurity</article-title>
          <source>Health Secur</source>
          <year>2020</year>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>228</fpage>
          <lpage>31</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1089/hs.2019.0123"/>
          </comment>
          <pub-id pub-id-type="doi">10.1089/hs.2019.0123</pub-id>
          <pub-id pub-id-type="medline">32559153</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <article-title>The state of ransomware in the US: report and statistics 2019</article-title>
          <source>Emsisoft Malware Lab</source>
          <year>2019</year>
          <month>12</month>
          <day>12</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/ykx5zjce">https://tinyurl.com/ykx5zjce</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <article-title>The state of ransomware in the US: report and statistics 2020</article-title>
          <source>Emsisoft Malware Lab</source>
          <year>2021</year>
          <month>1</month>
          <day>18</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.emsisoft.com/en/blog/37314/the-state-of-ransomware-in-the-us-report-and-statistics-2020/">https://www.emsisoft.com/en/blog/37314/the-state-of-ransomware-in-the-us-report-and-statistics-2020/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Branley-Bell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Magalini</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mari</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Magkanaraki</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anastasopoulou</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Your hospital needs you: eliciting positive cybersecurity behaviours from healthcare staff</article-title>
          <source>Ann Disaster Risk Sci</source>
          <year>2020</year>
          <volume>3</volume>
          <issue>1</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.51381/adrs.v3i1.51"/>
          </comment>
          <pub-id pub-id-type="doi">10.51381/adrs.v3i1.51</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Information Commissioner's Office</collab>
            <collab>National Cyber Security Centre</collab>
            <name name-style="western">
              <surname>James</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>New figures show large numbers of businesses and charities suffer at least one cyber attack in the past year</article-title>
          <source>United Kingdom Government</source>
          <year>2018</year>
          <month>4</month>
          <day>25</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.gov.uk/government/news/new-figures-show-large-numbers-of-businesses-and-charities-suffer-at-least-one-cyber-attack-in-the-past-year">https://www.gov.uk/government/news/new-figures-show-large-numbers-of-businesses-and-charities-suffer-at-least-one-cyber-attack-in-the-past-year</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <article-title>IT security in the era when everything can be hacked</article-title>
          <source>Kaspersky Lab</source>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.unodc.org/documents/organized-crime/cybercrime/cybercrime-april-2018/RUSSIAN_FED.pdf">https://www.unodc.org/documents/organized-crime/cybercrime/cybercrime-april-2018/RUSSIAN_FED.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>GDPR: getting ready for the new EU data protection regulation</article-title>
          <source>PECB Insights</source>
          <year>2018</year>
          <month>4</month>
          <day>27</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://insights.pecb.com/gdpr-compliance-getting-ready/">https://insights.pecb.com/gdpr-compliance-getting-ready/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Sairi</surname>
              <given-names>IH</given-names>
            </name>
            <name name-style="western">
              <surname>Zizi</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Khalid</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The importance of cybersecurity education in school</article-title>
          <source>Int J Inf Educ Technol</source>
          <year>2020</year>
          <volume>10</volume>
          <issue>5</issue>
          <fpage>378</fpage>
          <lpage>82</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.18178/ijiet.2020.10.5.1393"/>
          </comment>
          <pub-id pub-id-type="doi">10.18178/ijiet.2020.10.5.1393</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chowdhury</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Gkioulos</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Cyber security training for critical infrastructure protection: a literature review</article-title>
          <source>Comput Sci Rev</source>
          <year>2021</year>
          <month>05</month>
          <volume>40</volume>
          <fpage>100361</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.cosrev.2021.100361"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cosrev.2021.100361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Branley-Bell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Magalini</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mari</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Magkanaraki</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anastasopoulou</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cyber-risk in healthcare: exploring facilitators and barriers to secure behaviour</article-title>
          <source>Proceedings of the HCI for Cybersecurity, Privacy and Trust 2020</source>
          <year>2020</year>
          <conf-name>HCI-CPT 2020</conf-name>
          <conf-date>July 19-24, 2020</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/v2dbyrsx"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-030-50309-3_8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burns</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Honeyman</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A brief chronology of medical device security</article-title>
          <source>Commun ACM</source>
          <year>2016</year>
          <month>09</month>
          <day>22</day>
          <volume>59</volume>
          <issue>10</issue>
          <fpage>66</fpage>
          <lpage>72</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2890488"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2890488</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chua</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in the healthcare industry - A collaborative approach</article-title>
          <source>American Association for Physician Leadership</source>
          <year>2021</year>
          <month>1</month>
          <day>8</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.physicianleaders.org/articles/cybersecurity-healthcare-industry-collaborative-approach">https://www.physicianleaders.org/articles/cybersecurity-healthcare-industry-collaborative-approach</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Djenna</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Harous</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Saidouni</surname>
              <given-names>DE</given-names>
            </name>
          </person-group>
          <article-title>Internet of things meet internet of threats: new concern cyber security issues of critical cyber infrastructure</article-title>
          <source>Appl Sci</source>
          <year>2021</year>
          <month>05</month>
          <day>17</day>
          <volume>11</volume>
          <issue>10</issue>
          <fpage>4580</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/app11104580"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/app11104580</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Francis</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Medical devices that could put you at security risk</article-title>
          <source>IDG Communications</source>
          <year>2017</year>
          <month>4</month>
          <day>27</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.csoonline.com/article/561347/medical-devices-that-could-put-you-at-security-risk.html">https://www.csoonline.com/article/561347/medical-devices-that-could-put-you-at-security-risk.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Handa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shukla</surname>
              <given-names>SK</given-names>
            </name>
          </person-group>
          <article-title>Machine learning in cybersecurity: a review</article-title>
          <source>WIREs Data Min Knowl</source>
          <year>2019</year>
          <month>02</month>
          <day>17</day>
          <volume>9</volume>
          <issue>4</issue>
          <fpage>e1306</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/widm.1306"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/widm.1306</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lechner</surname>
              <given-names>NH</given-names>
            </name>
          </person-group>
          <article-title>Developing a compliant cybersecurity process for medical devices</article-title>
          <source>Proceedings of the Central European Conference on Information and Intelligent Systems</source>
          <year>2018</year>
          <conf-name>CECIIS 2018</conf-name>
          <conf-date>September 19-21, 2018</conf-date>
          <conf-loc>Varaždin, Croatia</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/openview/8a2a254a80f34ef64b55c71d5bac01d6/1?pq-origsite=gscholar&#38;cbl=1986354"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare</article-title>
          <source> Utica College</source>
          <year>2014</year>
          <access-date>2024-05-16</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/3usz5jat">https://tinyurl.com/3usz5jat</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lyon</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Making trade-offs for safe, effective, and secure patient care</article-title>
          <source>J Diabetes Sci Technol</source>
          <year>2017</year>
          <month>03</month>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>213</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1177/1932296816676281"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1932296816676281</pub-id>
          <pub-id pub-id-type="medline">28264187</pub-id>
          <pub-id pub-id-type="pmcid">PMC5478032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mohan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cyber security for personal medical devices internet of things</article-title>
          <source>Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems</source>
          <year>2014</year>
          <conf-name>DCOSS 2014</conf-name>
          <conf-date>May 26-28, 2014</conf-date>
          <conf-loc>Marina Del Rey, CA</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/DCOSS.2014.49"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/dcoss.2014.49</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baranchuk</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Refaat</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Patton</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Krishnan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kutyifa</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Upadhyay</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Lakkireddy</surname>
              <given-names>DR</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity for cardiac implantable electronic devices: what should you know?</article-title>
          <source>J Am Coll Cardiol</source>
          <year>2018</year>
          <month>03</month>
          <day>20</day>
          <volume>71</volume>
          <issue>11</issue>
          <fpage>1284</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0735-1097(18)30200-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jacc.2018.01.023</pub-id>
          <pub-id pub-id-type="medline">29475627</pub-id>
          <pub-id pub-id-type="pii">S0735-1097(18)30200-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC8418792</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perakslis</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in health care</article-title>
          <source>N Engl J Med</source>
          <year>2014</year>
          <month>07</month>
          <day>31</day>
          <volume>371</volume>
          <issue>5</issue>
          <fpage>395</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1056/nejmp1404358"/>
          </comment>
          <pub-id pub-id-type="doi">10.1056/nejmp1404358</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peterson</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Yes, terrorists could have hacked Dick Cheney’s heart</article-title>
          <source>The Washington Post</source>
          <year>2013</year>
          <month>10</month>
          <day>21</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.washingtonpost.com/news/the-switch/wp/2013/10/21/yes-terrorists-could-have-hacked-dick-cheneys-heart/">https://www.washingtonpost.com/news/the-switch/wp/2013/10/21/yes-terrorists-could-have-hacked-dick-cheneys-heart/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sajedi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Rahbar Yaghobi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Information hiding methods for E-Healthcare</article-title>
          <source>Smart Health</source>
          <year>2020</year>
          <month>03</month>
          <volume>15</volume>
          <fpage>100104</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.smhl.2019.100104"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.smhl.2019.100104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omotosho</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Adegbola</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Mikail</surname>
              <given-names>OO</given-names>
            </name>
            <name name-style="western">
              <surname>Emuoyibofarhe</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A secure electronic prescription system using steganography with encryption key implementation</article-title>
          <source>Int J Comput Inform Technol</source>
          <year>2014</year>
          <month>9</month>
          <volume>03</volume>
          <issue>5</issue>
          <fpage>980</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.48550/arXiv.1502.01264</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh Rayat</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Review on security challenges of data communication in IoT devices</article-title>
          <source>Int J Electron Eng</source>
          <year>2019</year>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>406</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.csjournals.com/IJEE/PDF11-2/61.%20Aman.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sittig</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Electronic health records and national patient-safety goals</article-title>
          <source>N Engl J Med</source>
          <year>2012</year>
          <month>11</month>
          <day>08</day>
          <volume>367</volume>
          <issue>19</issue>
          <fpage>1854</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1056/NEJMsb1205420"/>
          </comment>
          <pub-id pub-id-type="doi">10.1056/nejmsb1205420</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snell</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Healthcare data breach costs highest for 7th straight year</article-title>
          <source>Health IT Security</source>
          <year>2017</year>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://healthitsecurity.com/news/healthcare-data-breach-costs-highestfor-7th-straight-year">https://healthitsecurity.com/news/healthcare-data-breach-costs-highestfor-7th-straight-year</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bhuyan</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Kabir</surname>
              <given-names>UY</given-names>
            </name>
            <name name-style="western">
              <surname>Escareno</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Ector</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Palakodeti</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wyant</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kedia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dasgupta</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dobalian</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations</article-title>
          <source>J Med Syst</source>
          <year>2020</year>
          <month>04</month>
          <day>02</day>
          <volume>44</volume>
          <issue>5</issue>
          <fpage>98</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s10916-019-1507-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10916-019-1507-y</pub-id>
          <pub-id pub-id-type="medline">32239357</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-019-1507-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Raina MacIntyre</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Engells</surname>
              <given-names>TE</given-names>
            </name>
            <name name-style="western">
              <surname>Scotch</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Heslop</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Gumel</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Poste</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Herche</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Steinhöfel</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lim</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Broom</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Converging and emerging threats to health security</article-title>
          <source>Environ Syst Decis</source>
          <year>2018</year>
          <volume>38</volume>
          <issue>2</issue>
          <fpage>198</fpage>
          <lpage>207</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32288980"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10669-017-9667-0</pub-id>
          <pub-id pub-id-type="medline">32288980</pub-id>
          <pub-id pub-id-type="pii">9667</pub-id>
          <pub-id pub-id-type="pmcid">PMC7104605</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Filkins</surname>
              <given-names>BL</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Roberts</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Hultner</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Castillo</surname>
              <given-names>AP</given-names>
            </name>
            <name name-style="western">
              <surname>Ducom</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Topol</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Steinhubl</surname>
              <given-names>SR</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security in the era of digital health: what should translational researchers know and do about it?</article-title>
          <source>Am J Transl Res</source>
          <year>2016</year>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>1560</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27186282"/>
          </comment>
          <pub-id pub-id-type="medline">27186282</pub-id>
          <pub-id pub-id-type="pmcid">PMC4859641</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rodrigues</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>de la Torre</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>López-Coronado</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Analysis of the security and privacy requirements of cloud-based electronic health records systems</article-title>
          <source>J Med Internet Res</source>
          <year>2013</year>
          <month>08</month>
          <day>21</day>
          <volume>15</volume>
          <issue>8</issue>
          <fpage>e186</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2013/8/e186/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2494</pub-id>
          <pub-id pub-id-type="medline">23965254</pub-id>
          <pub-id pub-id-type="pii">v15i8e186</pub-id>
          <pub-id pub-id-type="pmcid">PMC3757992</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>-</collab>
          </person-group>
          <article-title>Verizon: 2019 data breach investigations report</article-title>
          <source>Comput Fraud Secur</source>
          <year>2019</year>
          <month>01</month>
          <volume>2019</volume>
          <issue>6</issue>
          <pub-id pub-id-type="doi">10.1016/S1361-3723(19)30060-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="web">
          <article-title>2022 cost of insider threats global report</article-title>
          <source>Ponemon Institute</source>
          <year>2022</year>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://protectera.com.au/wp-content/uploads/2022/03/The-Cost-of-Insider-Threats-2022-Global-Report.pdf">https://protectera.com.au/wp-content/uploads/2022/03/The-Cost-of-Insider-Threats-2022-Global-Report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wagner</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The medical data of hundreds of HUG patients accessible on the internet</article-title>
          <source>Ictjournal</source>
          <year>2019</year>
          <access-date>2019-10-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ictjournal.ch/news/2019-10-04/les-donnees-medicales-dune-centaines-de-patients-des-hug-accessibles-sur-internet">https://www.ictjournal.ch/news/2019-10-04/les-donnees-medicales-dune-centaines-de-patients-des-hug-accessibles-sur-internet</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arapi</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The healthcare industry: evolving cyber threats and risks</article-title>
          <source>Utica College</source>
          <year>2018</year>
          <month>5</month>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/openview/6fb8d8f9984e83b682b5499fb1d36194/1?pq-origsite=gscholar&#38;cbl=18750">https://www.proquest.com/openview/6fb8d8f9984e83b682b5499fb1d36194/1?pq-origsite=gscholar&#38;cbl=18750</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perriello</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>‘Medjack:’ hackers threaten hospitals using medical devices as back doors</article-title>
          <source>MassDevice</source>
          <year>2015</year>
          <month>6</month>
          <day>5</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.massdevice.com/medjack-hackers-threaten-hospitals-using-medical-devices-as-back-doors/">https://www.massdevice.com/medjack-hackers-threaten-hospitals-using-medical-devices-as-back-doors/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meggitt</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>MEDJACK attacks: the scariest part of the hospital</article-title>
          <source>Tufts University</source>
          <year>2018</year>
          <month>12</month>
          <day>18</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cs.tufts.edu/comp/116/archive/fall2018/smeggitt.pdf">https://www.cs.tufts.edu/comp/116/archive/fall2018/smeggitt.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rajamäki</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pirinen</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Towards the cyber security paradigm of ehealth: resilience and design aspects</article-title>
          <source>AIP Conf Proc</source>
          <year>2017</year>
          <month>6</month>
          <day>5</day>
          <volume>1836</volume>
          <issue>1</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1063/1.4981969"/>
          </comment>
          <pub-id pub-id-type="doi">10.1063/1.4981969</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Is cybersecurity possible in healthcare?</article-title>
          <source>National Cybersecur Institute J</source>
          <year>2015</year>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>49</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://publications.excelsior.edu/publications/NCI_Journal/1-3/offline/download.pdf#page=51"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kioskli</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Fotis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Mouratidis</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The landscape of cybersecurity vulnerabilities and challenges in healthcare: security standards and paradigm shift recommendations</article-title>
          <source>Proceedings of the 16th International Conference on Availability, Reliability and Security</source>
          <year>2021</year>
          <conf-name>ARES '21</conf-name>
          <conf-date>August 17-20, 2021</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3465481.3470033"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3465481.3470033</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tuttle</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Cyberdisaster: how the government compromised our security</article-title>
          <source>National Review</source>
          <year>2016</year>
          <month>9</month>
          <day>9</day>
          <access-date>2024-05-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nationalreview.com/2016/09/opm-hack-house-oversight-committee-report/">https://www.nationalreview.com/2016/09/opm-hack-house-oversight-committee-report/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Loi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Christen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kleine</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Weber</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in health – disentangling value tensions</article-title>
          <source>J Inform Commun Ethics Soc</source>
          <year>2019</year>
          <month>05</month>
          <day>13</day>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>229</fpage>
          <lpage>45</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1108/JICES-12-2018-0095"/>
          </comment>
          <pub-id pub-id-type="doi">10.1108/jices-12-2018-0095</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gordijn</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Loi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The ethics of cybersecurity</article-title>
          <source>CrimRxiv</source>
          <year>2020</year>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.crimrxiv.com/pub/s79bo1xu/release/1">https://www.crimrxiv.com/pub/s79bo1xu/release/1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coles-Kemp</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>Changing places: the need to alter the start point for information security design</article-title>
          <source>Electron J Health Inform</source>
          <year>2014</year>
          <volume>8</volume>
          <issue>2</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/publication/285954285_Changing_places_The_need_to_alter_the_start_point_for_information_security_design"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khaloufi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Abouelmehdi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Beni-hssane</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Saadi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Security model for big healthcare data lifecycle</article-title>
          <source>Procedia Comput Sci</source>
          <year>2018</year>
          <volume>141</volume>
          <fpage>294</fpage>
          <lpage>301</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.procs.2018.10.199"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.procs.2018.10.199</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holst</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sukums</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Radovanovic</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ngowi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Noll</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Winkler</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>Sub-Saharan Africa—the new breeding ground for global digital health</article-title>
          <source>Lancet Digit Health</source>
          <year>2020</year>
          <month>04</month>
          <volume>2</volume>
          <issue>4</issue>
          <fpage>e160</fpage>
          <lpage>2</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/S2589-7500(20)30027-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/s2589-7500(20)30027-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khando</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Islam</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Salman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Enhancing employees information security awareness in private and public organisations: a systematic literature review</article-title>
          <source>Comput Secur</source>
          <year>2021</year>
          <month>07</month>
          <volume>106</volume>
          <fpage>102267</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.cose.2021.102267"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cose.2021.102267</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Winton</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Hollywood hospital pays $17,000 in bitcoin to hackers; FBI investigating</article-title>
          <source>Los Angeles Times</source>
          <year>2016</year>
          <month>2</month>
          <day>18</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/5yae788s">https://tinyurl.com/5yae788s</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dobuzinskis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Finkle</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>California hospital makes rare admission of hack, ransom payment</article-title>
          <source>Reuters</source>
          <year>2016</year>
          <month>2</month>
          <day>20</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.reuters.com/article/idUSKCN0VS05M/">https://www.reuters.com/article/idUSKCN0VS05M/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bickers</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dunlevy</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Minear</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Hackers are offering to sell the medicare details of Australians on the dark web, government confirms</article-title>
          <source>News Corp Australia Network</source>
          <year>2017</year>
          <month>7</month>
          <day>4</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/4ryf66v8">https://tinyurl.com/4ryf66v8</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zorabedian</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>How malware works: anatomy of drive-by download web attack</article-title>
          <source>Sophos News</source>
          <year>2014</year>
          <month>3</month>
          <day>26</day>
          <access-date>2024-05-06</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://news.sophos.com/en-us/2014/03/26/how-malware-works-anatomy-of-a-drive-by-download-web-attack-infographic/">https://news.sophos.com/en-us/2014/03/26/how-malware-works-anatomy-of-a-drive-by-download-web-attack-infographic/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omotosho</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Asanga</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Fakorede</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Electronic prescription system for pediatricians</article-title>
          <source>Eur Sci J</source>
          <year>2017</year>
          <volume>13</volume>
          <issue>18</issue>
          <fpage>426</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.19044/esj.2017.v13n18p426"/>
          </comment>
          <pub-id pub-id-type="doi">10.19044/esj.2017.v13n18p426</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ren</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hussain</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Adversarial examples for CNN-based malware detectors</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>54360</fpage>
          <lpage>71</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/ACCESS.2019.2913439"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/access.2019.2913439</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
