Have a personal or library account? Click to login
Understanding Healthcare Cybersecurity Risk Management Complexity Cover

Understanding Healthcare Cybersecurity Risk Management Complexity

Open Access
|Feb 2024

References

  1. Barry, E., & Perlroth, N. (2020). Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack. The New York Times, available at: https://www.nytimes.com/2020/11/26/us/hospital-cyber-attack.html.
  2. Booher, H.R., & Minninger, J. (2003). Human systems integration in army systems acquisition in Handbook of Human Systems Integration, 663–698. Available at: <a href="https://doi.org/10.1002/0471721174.ch18." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1002/0471721174.ch18.</a>
  3. Boyce, M., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., & Lockett-Reynolds, J. (2011). Human Performance in Cybersecurity: a Research Agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 55, Issue 1, 1115–1119. DOI:<a href="https://doi.org/10.1177/1071181311551233." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1177/1071181311551233.</a>
  4. Burrell, D.N., Bhargava, N., Springs, D., Dawson, M., Burton, S.L., Anderson, D.P., & Wright, J.B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 4, Issue 1, 13–28. Doi:<a href="https://doi.org/10.4018/IJHIoT.2020010102." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/IJHIoT.2020010102.</a>
  5. Carter, S., & Perriam, J. (2021). Cybersecurity, digital failure, and social harm. Understanding Digital Societies, 359–386, SAGE Publications. Available at: https://pure.itu.dk/en/publications/cybersecurity-digital-failure-and-social-harm.
  6. Chaiken, B.P., & Holmquest, D.L. (2003). Patient Safety: Modifying Processes to Eliminate Medical Errors. Nursing Outlook, Vol. 51, Issue 3: S21–4. DOI: <a href="https://doi.org/10.1016/s0029-6554(03)00097-6." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/s0029-6554(03)00097-6.</a>
  7. Chamorro-Premuzic, T. (2023). Human Error Drives Most Cyber Incidents. Could A.I. Help? Harvard Business Review, available at: https://hbr.org/2023/05/human-error-drives-most-cyber-incidents-could-ai-help.
  8. Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, Vol. 113, 48–52. Available at: https://www.maturitas.org/article/S0378-5122(18)30165-8/fulltext.
  9. Cummings, T.G., & Worley, C.G. (2014). Organization development and change. Mason, USA: South-Western Cengage Learning.
  10. Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60–67. Available at: <a href="https://doi.org/10.1177/0266382118773624." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1177/0266382118773624.</a>
  11. Dawson, M. (2020). Cybercrime: Internet Driven Illicit Activities and Behavior. Land Forces Academy Review, Vol. 25, Issue 4, 356–362. DOI: <a href="https://doi.org/10.2478/raft-2020-0043." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2478/raft-2020-0043.</a>
  12. Dent, E. (2003). The complexity science organizational development practitioner. Organization Development Journal, Vol. 21, Issue 2. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2297056.
  13. Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers & Security, Vol. 80, 74–89. DOI:<a href="https://doi.org/10.1016/j.cose.2018.09.002." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.cose.2018.09.002.</a>
  14. Fogelberg, D., & Frauwirth, S. (2010). A complexity science approach to occupation: Moving beyond the individual. Journal of Occupational Science, Vol. 17, Issue 3, 131–139. Available at: <a href="https://doi.org/10.1080/14427591.2010.9686687." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1080/14427591.2010.9686687.</a>
  15. Janofsky, A. (2019, October 06). Smaller Medical Providers Get Burned by Ransomware. Wall Street Journal, available at: https://www.wsj.com/articles/smaller-medical-providers-get-burned-by-ransomware-11570366801.
  16. Kayisoglu, G., Bolat, P., & Tam, K. (2022). Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime. The Journal of Navigation, Vol. 75, Issue 6, 1364–1388. Available at: <a href="https://doi.org/10.1017/S0373463322000534." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1017/S0373463322000534.</a>
  17. Kennedy-Sims, C. (2021). Supply chain management in level I trauma care facilities: Can it determine patient care delivery and funding? (Order No. 28539929). Available from ProQuest Dissertations & Theses Global.
  18. Landsburg, A.C., Avery, L., Beaton, R., Bost, J.R., Comperatore, C., Khandpur, R., Malone, T.B., Parker, C., Popkin, S., & Sheridan, T.B. (2008). The art of successfully applying human systems integration. Naval Engineers Journal, Vol. 120, Issue 1, 77–107. Available at: <a href="https://doi.org/10.1111/j.1559-3584.2008.00113.x." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1111/j.1559-3584.2008.00113.x.</a>
  19. Leape, L.L. (2000). Institute of Medicine medical error figures are not exaggerated. JAMA, Vol. 284, Issue 1, 95–7. DOI: <a href="https://doi.org/10.1001/jama.284.1.95." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1001/jama.284.1.95.</a>
  20. Levinthal, D.A., & Warglien, M. (1999). Landscape Design: Designing for Local Action in Complex Worlds. Organization Science, Vol. 10, Issue 3, 342–357. DOI:<a href="https://doi.org/10.1287/orsc.10.3.342." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1287/orsc.10.3.342.</a>
  21. McNeese, M.D., Cooke, N.J., D’Amico, A., Endsley, M.R., Gonzalez, C., Roth, E., & Salas, E. (2012). Perspectives on the role of cognition in cyber security. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 56, Issue 1, 268–271. DOI:<a href="https://doi.org/10.1177/1071181312561063." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1177/1071181312561063.</a>
  22. Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA – Journal of Business and Public Administration, Vol. 9, Issue 3, 71–88. DOI: <a href="https://doi.org/10.2478/hjbpa-2018-0024." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.2478/hjbpa-2018-0024.</a>
  23. Passmore, W., Winby, S., Mohrman, S., & Vanasse, R. (2019). Reflections: Sociotechnical Systems Design and Organization Change. Journal of Change Management, Vol. 19, Issue 2, 67–85. DOI:<a href="https://doi.org/10.1080/14697017.2018.1553761." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1080/14697017.2018.1553761.</a>
  24. Reason, J. (2000). Human error: models and management. British Medical Journal, Vol. 320, 768–770. Available at: <a href="https://doi.org/10.1136/bmj.320.7237.768." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1136/bmj.320.7237.768.</a>
  25. Senge, P.M. (2006). The Fifth Discipline: The Art & Practice of the Learning Organization. New York: Doubleday.
  26. Senge, P.M. (1990). The Fifth Discipline: The Art & Practice of The Learning Organization. New York: Doubleday/Currency.
  27. Senge, P.M. (2014). The fifth discipline field book: Strategies and tools for building a learning organization. New York: Crown Currency.
  28. Slangen, R. (2016). Understanding Cyber-risk by Investigating the Behaviour of Defender and Threat Agent Organisations: Why a Complex Adaptive Systems Perspective Contributes to Further Understanding Cyber-risk. TUDelft, Master Thesis. Available at: http://resolver.tudelft.nl/uuid:3951b6a2-db0c-4e69-8da8-9fa28bc28237.
  29. Shufutinsky, A. (2018). Organizational Assessment of a Biotechnology Firm’s Safety, Health, and Environmental Department through an Organizational Development Lens. International Journal of Interdisciplinary & Multidisciplinary Studies, Vol. 4, Issue 3.
  30. Shufutinsky, A. (2019). Tribalism and Clone Theory in New Leaders and the Resulting Degradation of Organizational Culture. Psychology & Behavioral Science International Journal, Vol. 10, Issue 2: 555788. DOI:<a href="https://doi.org/10.19080/PBSIJ.2019.10.555788." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.19080/PBSIJ.2019.10.555788.</a>
  31. Shufutinsky, A., Sibel, J., Beach, Saraceno, A., & Beach, A. (2020). O.D. for Robots? Implications of Industry 4.0 on Talent Acquisition and Development. Organization Development Journal, Vol. 38, Issue 3, 59–76. Available at: https://www.researchgate.net/publication/343671489_OD_for_Robots_Implications_of_Industry_40_on_Talent_Acquisition_and_Development.
  32. Siggelkow, N., & Rivkin, J.W. (2005). Speed and search: Designing organizations for turbulence and complexity. Organization Science, Vol. 16, Issue 2, 101–122.
  33. Simon, H.A. (1962). The Architecture of Complexity. Proceedings of the American Philosophical Society, Vol. 106, Issue 6, 467–82.
  34. Simpson, P. (2007). Organizing in the mist: A case study in leadership and complexity. Leadership & Organization Development Journal, Vol. 28, Issue 5, 465–482. DOI:<a href="https://doi.org/10.1108/01437730710761751." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/01437730710761751.</a>
  35. Skarzauskiene, A. (2010). Managing complexity: Systems thinking as a catalyst of the organization’s performance. Measuring Business Excellence, Vol. 14, Issue 4, 49–64. DOI:<a href="https://doi.org/10.1108/13683041011093758." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/13683041011093758.</a>
  36. Stacey, R. (2011). Strategic management and organizational dynamics: The challenge of complexity to ways of thinking about organizations (6th Edition). London: Pearson Education Ltd.
  37. Trist, E. & Emery, F. (2005). Organizational Behavior 2: Essential Theories of Process and Structure, 169. New York: Routledge. Available at: <a href="https://doi.org/10.4324/9781315702001." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4324/9781315702001.</a>
  38. Vermeulen, P., Zietsma, C., Greenwood, R., & Langley, A. (2016). Strategic responses to institutional complexity. Strategic Organization, Vol. 14, Issue 4, 277–286.
  39. van der Kleij, R., & Leukfeldt, R. (2020). Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24–28, 2019, Washington DC, USA 10, 16–27. DOI:<a href="https://doi.org/10.1007/978-3-030-20488-4_2." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-030-20488-4_2.</a>
  40. Walker, G.H., Stanton, N.A., Salmon, P.M., & Jenkins, D.P. (2008). A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theoretical Issues in Ergonomics Science, Vol. 9, Issue 6, 479–499.
  41. Wickham, M.H. (2019). Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis (Order No. 13861149). Available from ProQuest Dissertations & Theses Global. (2216485062).
  42. Willett, K.D. (2016). Cybersecurity decision patterns as adaptive knowledge encoding in cybersecurity operations. Doctoral dissertation, Stevens Institute of Technology.
  43. Yan, D. (2020). A Systems Thinking for Cybersecurity Modeling. arXiv preprint arXiv:2001.05734.
  44. Zhadan, A. (2023). World Economic Forum finds that 95% of cybersecurity incidents occur due to human error. Cybernews. Available at: https://cybernews.com/editorial/world-economic-forum-finds-that-95-of-cybersecurity-incidents-occur-due-to-human-error/.
  45. Zoto, E., Kianpour, M., Kowalski, S.J., & Lopez-Rojas, E.A. (2019). A sociotechnical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, Vol. 18, 65–75.
DOI: https://doi.org/10.2478/raft-2024-0004 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 38 - 49
Published on: Feb 28, 2024
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2024 Darrell Norman Burrell, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.