Dylan Watson 10/30/24

Cyber Victimization in the Healthcare Industry

Article Link:“Cyber Victimization in the Healthcare Industry: Analyzing Offender Mo” by Yashna Praveen, Mijin Kim et al.

Introduction:

The article “Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)” by Yashna Praveen, Mijin Kim, and Kyung-Shick Choi delves into the intersection of social sciences and cybersecurity. It uses criminological theories to explore why cybercriminals target the healthcare sector and what makes certain entities more vulnerable.

Examination:

The study poses critical questions about the motivations behind these cyber-attacks and the specific characteristics that make healthcare facilities attractive targets. By examining documented cases of cyber victimization, the authors identify patterns and vulnerabilities through the frameworks of RAT and Cyber-RAT.

The research relies on qualitative data from real-world cyber-attacks, analyzing them to uncover common themes in offender behavior and target weaknesses. This approach helps to understand the dynamics of cyber threats in healthcare and suggests ways to mitigate these risks.

If your PowerPoint presentations covered topics like cybersecurity frameworks, risk assessment, or criminological theories, you’ll find a direct connection to the article’s use of RAT and Cyber-RAT. 

Explanation:

These theories provide a structured way to analyze and address cyber risks.

The article also highlights the disproportionate impact of cyber-attacks on marginalized groups, emphasizing the need for inclusive cybersecurity measures that protect all patients. This focus on equity is crucial in ensuring that everyone has access to safe and secure healthcare services.

Conclusion:

Overall, the study enhances our understanding of cyber threats in the healthcare industry, proposes preventive measures, and informs policymakers and healthcare administrators about effective cybersecurity strategies. It underscores the importance of protecting sensitive health information and ensuring the resilience of healthcare services against cyber-attacks.

Praveen, Y., Kim, M., & Choi, K.-S. (Year). Cyber victimization in the healthcare industry: Analyzing offender motivations and target characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT). Journal Name, Volume(Issue), pages. DOI or URL (if available).

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, 113, 48-52. https://doi.org/10.1016/j.maturitas.2018.04.008

O’Donnell, A. T., Kanthawala, S., & Kim, S. H. (2020). Health information security and privacy in the health information ecosystem: Implications for eHealth. Telemedicine and e-Health, 26(9), 1117-1124. https://doi.org/10.1089/tmj.2019.0255

LeClair, J., & Johnson, M. (2019). Cybersecurity in healthcare: Safeguarding patient data and ensuring compliance. Journal of Health Informatics & Management, 3(2), 23-36.