Näytä suppeat kuvailutiedot

dc.contributor.authorLehto, Martti
dc.contributor.authorNeittaanmäki, Pekka
dc.contributor.authorPöyhönen, Jouni
dc.contributor.authorHummelholm, Aarne
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-02T12:39:07Z
dc.date.available2023-02-02T12:39:07Z
dc.date.issued2022
dc.identifier.citationLehto, M., Neittaanmäki, P., Pöyhönen, J., & Hummelholm, A. (2022). Cyber Security in Healthcare Systems. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 183-215). Springer . Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_8" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_8</a>
dc.identifier.otherCONVID_117603745
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85321
dc.description.abstractHealthcare is a good example of a structure whose complexity has been increased by the general rapid development of technology and digitalization. Digital development has made it possible to provide services in new ways and on a wider scale, in particular through information networks. Today, the healthcare information environment is a networked entity consisting of various ICT systems, medical devices, and clinical systems with an open system structure. Digitalized functions and services are becoming more common in social welfare and healthcare. Their reliability during incidents and emergencies must be ensured. While the digital world offers good opportunities for improving healthcare systems and enhancing disease analysis, we need to look deeper into this. Devices and information systems may not work well together and there are vulnerabilities in people, processes and technology. Thus, a comprehensive approach to healthcare cybersecurity is needed.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.otherhealthcare
dc.subject.othercyber security
dc.subject.otherhospital
dc.subject.otherinformation systems
dc.titleCyber Security in Healthcare Systems
dc.typebook part
dc.identifier.urnURN:NBN:fi:jyu-202302021603
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineLaskennallinen tiedefi
dc.contributor.oppiaineComputing, Information Technology and Mathematicsfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineComputational Scienceen
dc.contributor.oppiaineComputing, Information Technology and Mathematicsen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange183-215
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.type.publicationbookPart
dc.subject.ysosairaalat
dc.subject.ysoterveydenhuolto
dc.subject.ysodigitalisaatio
dc.subject.ysokyberturvallisuus
dc.subject.ysohaavoittuvuus
dc.subject.ysotietojärjestelmät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p1090
jyx.subject.urihttp://www.yso.fi/onto/yso/p2658
jyx.subject.urihttp://www.yso.fi/onto/yso/p8692
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p25011
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_8
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright