cover
Contact Name
R. Ahmad Zaky El Islami
Contact Email
citj.gmpi@gmail.com
Phone
-
Journal Mail Official
citj.gmpi@gmail.com
Editorial Address
Perumahan Citra Gading Blok C5 No.14 RT 05/05 Kel. Cilaku, Kec. Curug, Kota Serang, Provinsi Banten, Indonesia, Post Code 42121
Location
Kota serang,
Banten
INDONESIA
Cybersecurity and Innovative Technology Journal
ISSN : -     EISSN : 30256682     DOI : http://dx.doi.org/10.53889/citj.v2i1.338
Core Subject : Science,
Cybersecurity and Innovative Technology Journal is a peer-reviewed journal that covers research publications and review articles in the field of cybersecurity and innovative technology. Cybersecurity and Innovative Technology Journal is published by Gemilang Maju Publikasi Ilmiah (GMPI). Cybersecurity and Innovative Technology Journal has become a Crossref member since year 2023 with prefix 10.53889. Therefore all articles published by Cybersecurity and Innovative Technology Journal will have uniques DOI numbers since Vol.1, No.1, September 2023. Since Vol.1, No.1, September 2023. Cybersecurity and Innovative Technology Journal uses Anti-Plagiarism Software "Turnitin" to check the authenticity article.
Articles 5 Documents
Search results for , issue "Vol 2, No 1 (2024)" : 5 Documents clear
The Emerging Obstacles in the Provision of Healthcare Supply Chain Services
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.341

Abstract

The COVID-19 pandemic has exposed flaws in the healthcare supply chain, including shortages, delays, and logistical issues. Key problems include inadequacies in resilience, visibility restrictions, cost management obstacles, integration barriers, unstated costs, and disparities in inclusivity. This research uses secondary data analysis to analyze findings from academic literature, industry reports, and case studies. It emphasizes the value of resilience and visibility, suggesting investing in blockchain, AI, and IoT technology for increased transparency and risk management. The report also emphasizes the need for proactive solutions, such as data analytics for improved supply chain visibility, hybrid inventory strategies for cost control, and stakeholder engagement for smooth integration. Integrating procurement, transportation, storage, and production, addressing misuse and hidden costs, and fostering inclusion are critical aspects of enhancing the healthcare supply chain.
The Growing Number of Cybersecurity Vulnerabilities Inside Healthcare Supply Chain Maurice L. McBride
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.338

Abstract

The healthcare supply chain is increasingly vulnerable to cybersecurity risks due to the integration of digital technology. The rise of digital records, telemedicine, and network connectivity has made it more susceptible to cyberattacks. The COVID-19 pandemic has further exacerbated this vulnerability, highlighting deficiencies in medical supplies, equipment, and services. The sector has implemented cybersecurity precautions, such as following HIPAA and GDPR, and collaborating with authorities and experts. However, the changing threat landscape necessitates continuous updates and changes. The study uses secondary data from the past three years to highlight the need for strong cybersecurity protocols to protect patient data, deliver services, and defend the supply chain from new threats. Future research should explore leveraging blockchain and AI-based cybersecurity, as well as strengthening government regulation, international cooperation, cybersecurity education, and patient empowerment.
Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.333

Abstract

Healthcare information systems hold significant importance; hence, their cybersecurity is crucial. Exposed networks make it easy for cybercriminals to launch cyberattacks and access healthcare data. Thus, concerns regarding cybersecurity and its link to healthcare privacy, confidential data, and medical devices are growing. Therefore, cybersecurity vulnerabilities in healthcare and patient security are significant issues. Healthcare information systems comprise correlated networks and play a vital role in treating and saving patients. However, advanced circulated ransomware attacks on hospitals prevent access to electronic health records for providing appropriate patient care, thus forcing doctors to turn to other facilities. These cyberattacks can leak patient data, and regaining control of information systems and patient data is highly expensive, thus resulting in extensive monetary losses. Cyberattacks aimed toward electronic medical records, information technology systems, and medical devices have corrupted the best systems across clinics and small offices with physicians, as well as merged health systems. There is an urgency to address cybersecurity vulnerabilities in healthcare; however, opinions differ regarding suitable measures for safeguarding patient data and ensuring infrastructural security. We aimed to reconcile these diverging hypotheses and provide an understanding of the current landscape and directions for further improvements by reviewing several studies on healthcare cybersecurity. We also interviewed healthcare professionals, cybersecurity experts, and administrators and distributed a survey questionnaire to healthcare organizations to gather quantitative data on existing cybersecurity measures and vulnerabilities. Our analyses show that healthcare organizations are vulnerable to a variety of threats, cyberattacks disrupt the health sector, cybersecurity vulnerabilities impact patient security, and implementations of cybersecurity measures are inconsistent across organizations. Owing to the sophisticated nature of cyberattacks, the healthcare industry must prioritize cybersecurity and provide the funding required to develop critical systems for safeguarding patients and their data. The study's findings underscore the need for standardized cybersecurity practices in healthcare to address inconsistencies in measures across organizations. Adequate and ongoing investment in cybersecurity infrastructure is imperative to counter increasingly sophisticated cyberattacks. Additionally, protecting patient data and maintaining trust within the healthcare sector are ethical imperatives that should guide industry actions. By embracing these implications, the healthcare industry can enhance patient security, financial stability, and ethical integrity.
Predicting Vulnerabilities in the Delivery of Secure Healthcare Supply Chain Services Maurice L. McBride
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.340

Abstract

The COVID-19 pandemic exposed the weaknesses in healthcare supply chains, leading to shortages, increased costs, and untrustworthy vendors. This has put patients at risk for treatment delays, worse care, and higher death rates. The healthcare supply chain's dependence on single sourcing has made these issues worse. Geopolitical conflicts, climatic catastrophes, data privacy issues, cybersecurity threats, and counterfeit goods are emerging risks. Resilient solutions are needed due to the complex ecosystem of manufacturers, wholesalers, regulatory organizations, and healthcare providers. Supply Chain Resilience (SCRES) is crucial for uninterrupted healthcare services, with redundancy, visibility, and adaptability being key components. Future research directions include blockchain integration, data analytics, and regulatory frameworks to improve resilience. Successful mitigation solutions require understanding interdependence, resilience measurements, and behavioral elements. Addressing these vulnerabilities is crucial for patient safety and healthcare effectiveness.
Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.344

Abstract

This study explores the complexities of cybersecurity challenges in electronic health record (EHR) systems and provides comprehensive solutions to enhance security. Furthermore, it analyzes existing research on EHR cybersecurity, considers relevant frameworks, and presents a well-designed research approach. Extensive research has examined the cybersecurity landscape of electronic health records (EHRs). Furthermore, it identifies the inherent flaws, challenges, and threats prevalent in existing systems and firmly emphasizes the need for robust security solutions to safeguard sensitive patient information. This study highlights the significance of addressing EHR cybersecurity concerns, enhancing existing knowledge on vulnerabilities, and providing a comprehensive understanding of this field. The study emphasizes the need for proactive and multifaceted security measures that can adapt to the ever-evolving landscape of cyber threats. Future research must continue to explore innovative tools and methodologies to safeguard EHRs against the increasing complexity and sophistication of cyber threats.

Page 1 of 1 | Total Record : 5


Filter by Year

2024 2024