Open Access

Intersections of Telemedicine / Telehealth and Cybersecurity: The Age of Resilience and COVID-19


Cite

Accenture Federal Services. (2018). The nature of effective defense: Shifting from cybersecurity to cyber resilience. Author. Available at: https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Local/en/Accenture-Shifting-from-Cybersecurity-to-Cyber-Resilience-POV.pdf Search in Google Scholar

American Telemedicine Association (ATA). (2013). Telemedicine Case Studies. Author. Available at: www.americantelemed.org Search in Google Scholar

American Telemedicine Association (ATA). (2021, June 15). IMPACT announces new definition of virtual first care at ATA 2021. Author. Available at: https://www.americantelemed.org/member-partner-news/impact-announces-new-definition-of-virtual-first-care-at-ata-2021/ Search in Google Scholar

Bailey, S.R. (2021, February 10). Pandemic exposes dire need to rebuild public health infrastructure. American Medical Association, available at: https://www.amaassn.org/about/leadership/pandemic-exposes-dire-need-rebuild-public-health-infrastructure. Search in Google Scholar

Brown-Jackson, K.L. (2017). Disrupting and retooling: A model for an effective community-based telehealth program. The National Graduate School of Quality Management, ProQuest Dissertations Publishing, 28144638. Search in Google Scholar

Burrell, D.N. (2021). Cybersecurity leadership from a talent management organizational development lens. [Unpublished Exegesis]. Capitol Technology University. Search in Google Scholar

Burrell, D.N., Aridi, A.S., & Nobles, C. (2018). The critical need for formal leadership development programs for cybersecurity and information technology professionals. Reading: Academic Conferences International Limited, available at: https://www.proquest.com/conference-papers-proceedings/critical-need-formal-leadership-development/docview/2018926662/se-2?accountid=167615 Search in Google Scholar

Burton, S.L. (2019). Grasping the cyber-world: Artificial intelligence and human capital meet to inform leadership. International Journal of Economics, Commerce, and Management, Vol. 7, Issue 12, 707-759. Search in Google Scholar

Burton, S.L. (2020). Protection via business impact analysis in a cyber world: A 3-Part series. In Latifi S. (eds) 17th International Conference on Information Technology-New Generations (ITNG 2020). Advances in Intelligent Systems and Computing, 1134. Springer, Cham, available at: https://doi.org/10.1007/978-3-030-43020-7_1 Search in Google Scholar

Burton, S.L. (2021). Artificial intelligence (AI) and augmented reality (AR): Disambiguated in the telemedicine/telehealth sphere. DOI: 10.2478/bsalt-2021-0001. Open DOISearch in Google Scholar

Burton, S.L. (2017). Transitioning to I can from I canʼt. Lulu Publications. Search in Google Scholar

Camlek, V. (2020). Telehealth – A technology-based weapon in the war against the Coronavirus. Frost & Sullivan, available at: https://store.frost.com/telehealth-atechnology-based-weapon-in-the-war-against-thecoronavirus-2020.html Search in Google Scholar

Collier, K., Dilanian, K., & Winter, T. (2020, October 30). More hospitals hit by ransomware as feds warn about cyberattacks. NBC News, available at: https://www.nbcnews.com/tech/tech-news/more-hospitals-hit-ransomware-feds-warn-about-cyberattacks-n1245292 Search in Google Scholar

Cho, S. (2007). A contextualist approach to telehealth innovations (Order No. 3292697). Healthcare Administration Database. (304877569). Available at: https://www.proquest.com/dissertations-theses/contextualist-approach-telehealth-innovations/docview/304877569/se-2?accountid=167615 Search in Google Scholar

Cohen, E. (2019). Global life sciences & healthcare. Appian. Available at: https://appian.com/blog/2019/four-challenges-facing-the-life-sciences-industry-in-2020.html Search in Google Scholar

Kotter, J.P., & Cohen, D.S. (2005). The heart of change field guide. Boston, MA: Harvard Business Press. Search in Google Scholar

Daemmrich, A. (2017). Invention, innovation systems, and the Fourth Industrial Revolution. Technology and Innovation, Vol. 18, Issue 4, 257-265. doi: http://dx.doi.org.proxy.cecybrary.com/10.21300/18.4.2017.25710.21300/18.4.2017.257 Search in Google Scholar

Davis, J. (2021, March 5). FBI probing 2 hospital ransomware attacks; hackers remove health data. Health IT Security. Available at: https://healthitsecurity.com/news/fbi-probing-2-hospital-ransomware-attacks-hackers-remove-health-data Search in Google Scholar

Dawson, M., Bacius, R., Gouveia, L.B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 251, Issue 101, 69-75. DOI: 10.2478/raft-2021-0011. Open DOISearch in Google Scholar

DeSalvo, K., Parekh, A., Hoagland, G. Wet. et al. (2019). Developing a financing system to support public health infrastructure. American Journal of Public Health, Vol. 109, Issue 10,1358-136110.2105/AJPH.2019.305214 Search in Google Scholar

Douglas, C., & Thomas, H. (2020, October 21). The pandemic affecting the healthcare sector-a call for amending the HITECH Act. CPO Magazine. https://www.cpomagazine.com/cyber-security/the-pandemic-affecting-the-healthcare-sector-a-call-for-amending-the-hitech-act/ Search in Google Scholar

Drees, J. (2020, May 19). Telehealth to grow nearly 65% in 2020, report finds. Becker Hospital Review, available at: https://www.beckershospitalreview.com/telehealth/telehealthto-grow-nearly-65-in-2020-report-finds.html Search in Google Scholar

FAIR Health. (2021). Monthly Telehealth Regional Tracker. Author. Available at: https://www.fairhealth.org/states-by-the-numbers/telehealth Search in Google Scholar

Franco, E.G., Schwab, K., Brende, B., Dusek, M., & Howell, L. (2020). The global risks report 2020. World Economic Forum. Cologny/Geneva, Switzerland. Available at: http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf Search in Google Scholar

Garrison, C., & Hamilton, C. (2019, January 02). A comparative analysis of the EU GDPR to the USʼs breach notifications. Information & Communications Technology Law, Vol. 28, Issue 1, 99-114. doi:10.1080/13600834.2019.1571473.hdl:10535/10737. ISSN 1360-0834 Open DOISearch in Google Scholar

Healthcare & Public Health Sector Coordinating Councils. (2020, May). Health Industry Cybersecurity Tactical Crisis Response Guide (HIC-TCR). Author. Available at: https://healthsectorcouncil.org/hic-tcr/ Search in Google Scholar

Healthcare & Public Health Sector Coordinating Councils. (2021, April). Health industry cybersecurity-securing telehealth and telemedicine (HIC-STAT). Author. Available at: https://healthsectorcouncil.org/securingtelehealth/ Search in Google Scholar

Horne, III, J.F., & Orr, J.E. (2011). Assessing behaviors that create resilient organizations. Employment Relations Today, Vol. 24, Issue 4, 29-39. https://doi.org/10.1002/ert.3910240405 Search in Google Scholar

Holt, B., Evernham, A. Armstrong, S., Boling, C., Butler, O., Coleman, C., Meehan, H., Morrison, W., Mulligan, M., Scarola, M., Weese, M., & DePersia, T. (2015). Presidential Policy Directive 21 Implementation: An Interagency Security Committee White Paper. Available at: https://www.cisa.gov/sites/default/files/publications/ISC-PPD-21-Implementation-White-Paper-2015-508.pdf Search in Google Scholar

Illusive. (2021). The top threats targeting pharma and life sciences. Author. Available at: https://go.illusive.com/top-pharma-life-sciences-threats-whitepaper Search in Google Scholar

Isenberg, R., Kristensen, I., Mihir, M., & Weinstein, D. (2021, June 30). Building cyber resilience in national critical infrastructure. McKinsey & Company. Available at: https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/building-cyber-resilience-in-national-critical-infrastructure Search in Google Scholar

Jercich, K. (2020a, October 21). CMS reports 34.5M telehealth services delivered March through June. HIMSS HealthcareIT News. Available at: https://www.healthcareitnews.com/news/cms-reports-345m-telehealth-services-delivered-march-through-june Search in Google Scholar

Jercich, K. (2020b, November 2). CDC: Telehealth visits more than doubled in March 2020. HIMSS HealthcareIT News. Available at: https://www.healthcareitnews.com/news/cdc-telehealth-visits-more-doubled-march-2020 Search in Google Scholar

Kozina, M., & Barun, A. (2016). Implementation of the business impact analysis for the business continuity in the organization. Varazdin Development and Entrepreneurship Agency (VADEA), Varazdin. Available at: https://proxy.cecybrary.com/login?url= https://search-proquest-419com.proxy.cybrary.com/docview/1793195819?accountid=420144459 Search in Google Scholar

Maani, N., & Galea, S. (2020 June). COVID-19 and underinvestment in the public health infrastructure of the United States. The Milbank Quarterly, Vol. 98. Available at: https://www.milbank.org/quarterly/articles/covid-19-and-underinvestment-in-the-public-health-infrastructure-of-the-united-states/#_edn710.1111/1468-0009.12463 Search in Google Scholar

Madni, A.M., & Jackson, S. (2009 June). Towards a conceptual framework for resilience engineering. IEEE Systems Journal, Vol. 3, Issue 2, 181-191. DOI: 10.1109/JSYST.2009.2017397. Open DOISearch in Google Scholar

Mallak, L.A. (1999). Toward a theory of organizational resilience. Management of Engineering and Technology, 1999. Technology and Innovation Management. PICMET ‘99. Portland International Conference on, Portland, OR, USA, 223.10.1109/PICMET.1999.808142 Search in Google Scholar

Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: how safe are we? BMJ: British Medical Journal (Online), Vol. 358. Available at: http://franklin.captechu.edu:2123/10.1136/bmj.j317910.1136/bmj.j3179 Search in Google Scholar

Masood, T. & Egger, J. (2020). Adopting augmented reality in the age of industrial digitalization. Computers in Industry, 115. Available at: https://doi.org/10.1016/j.compind.2019.07.002 Search in Google Scholar

Metricstream. (2021). Cyber resilience best practices: Connecting the dots beyond cybersecurity. Author. Available at: https://www.metricstream.com/insights/best-practices-cyber-resilience.htm Search in Google Scholar

Morris-Reade, R. (2021). New research finds 93 % of security leaders don’t repeat to the CEO. Security Brief New Zealand. Available at: https://securitybrief.co.nz/story/new-research-finds-93-of-security-leaders-don’t-report-to-the-ceo Search in Google Scholar

Muller, S.R. (2020). A Perspective On the intersection of information security policies and IA awareness, factoring in end-user behavior. Proceedings of the International Conference on Research in Management & Technovation, 137-142. DOI: 10.15439/2020KM1 Open DOISearch in Google Scholar

Müller, A., & Pfleger, R. (2014). Business transformation towards sustainability. Business Research, Vol. 7, Issue 2, 313-350. DOI: http://dx.doi.org/10.1007/s40685-014-0011-y10.1007/s40685-014-0011-y Search in Google Scholar

National Institute of Standards and Technology (NIST). (2014, February 12). Framework for improving critical infrastructure security, Version 1.0. Available at: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf Search in Google Scholar

National Institute of Standards and Technology (NIST). (2018, April 16). Cybersecurity framework v1.1. Author. Available at: https://csf.tools/reference/nist-cybersecurity-framework/v1-1/ Search in Google Scholar

Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. Holistica – Journal of Business and Public Administration, Vol. 9, Issue 3, 71-88. Available at: https://doi.org/10.2478/hjbpa-2018-0024 Search in Google Scholar

Obama, B. (2013, February 12). Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. Presidential Policy Directive (PPD) Series. United States. White House. Available at: https://www.hsdl.org/?view&did=731087 Search in Google Scholar

Pellathy, D., & Stank, T. (2020, July 09). Commentary: Cybersecurity safeguards should extend to supply-chain partners; companies must treat cybersecurity as a supply chain as work changes under the coronavirus pandemic create new vulnerabilities, say two supply-chain educators. Wall Street Journal (Online). Available at: https://www.proquest.com/newspapers/commentary-cybersecurity-safeguards-should-extend/docview/2421518350/se-2?accountid=167615 Search in Google Scholar

Perlroth, N. & Satariano, A. (2021, May 20). Irish hospitals are latest to be hit by ransomware attacks. NY Times. Available at: https://www.nytimes.com/2021/05/20/technology/ransomware-attack-ireland-hospitals.html Search in Google Scholar

PR Wire. (2020, September 10). SecurityScorecard names telehealth biggest healthcare threat in new report. Author. Available at: https://www.prnewswire.com/news-releases/securityscorecard-names-telehealth-biggest-healthcare-threat-in-new-report-301127130.html Search in Google Scholar

Research 2 Guidance 2021. (2021 June). 2021 Global COVID-19 Survey. Author. Available at: https://research2guidance.com/ Search in Google Scholar

RSI Security. (2019, August 14). What is cyber resilience and why is it important? Author. Available at: https://blog.rsisecurity.com/what-is-cyber-resilience-and-why-is-it-important/ Search in Google Scholar

Schuchat, A. (2020). Public health response to the initiation and spread of pandemic COVID-19 in the United States, February 24 – April 21, 2020. MMWR Morbidity and Mortality Weekly Report 2020, Vol. 69, Issue 18, 551-556. DOI: http://dx.doi.org/10.15585/mmwr.mm6918e2 10.15585/mmwr.mm6918e2 Search in Google Scholar

Security and Privacy, 45 C.F.R. (§) Part 164 Subparts A and C. (2022). Search in Google Scholar

Sterbenz, J.P.G., Hutchinson, D., Cetinkaya, E.K., Jabbar, A., Rohrer, J.P., Scholler, M., & Smith, P. (2010, March 17). Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, Vol. 54, Issue 8, 1245-1265. Available at: https://doi.org/10.1016/j.comnet.2010.03.005 Search in Google Scholar

Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, Vol. 12, Issue 3, 417-432. Available at: https://www.proquest.com/scholarly-journals/analysis-cybersecurity-standard-framework/docview/2483980790/se-2?accountid=16761510.17762/ijcnis.v12i3.4817 Search in Google Scholar

Sykes, N. (2019, April 25). Cybersecurity: What every telemedicine practitioner needs to know. Arizona Telemedicine Program. Available at: https://telemedicine.arizona.edu/blog/cybersecurity-what-every-telemedicine-practitioner-needs-know#:~:text=But%20because%20of%20the%20nature%20of%20the%20platform,health%20professional%20via%20a%20mobile%20app%2C%20for%20instance Search in Google Scholar

Taylor, C., & Burton, S.L. (2018). Advanced certified telemedicine/telehealth professional (A-CTTP). Lulu Publications. Search in Google Scholar

The Security Rule, 45 C.F.R. (§) Part 160. (2010). Search in Google Scholar

UNESCO. (2020a). Education in a past-COVID-19 world: Nine ideas for public action. Available at: https://en.unesco.org/sites/default/files/education_in_a_post-covid_world-nine_ideas_for_public_action.pdf Search in Google Scholar

Verma, S. (2020, July 15). Early impact of CMS expansion of Medicare telehealth during COVID-19. Health Affairs Blog. doi: 10.1377/hblog20200715.454789 Open DOISearch in Google Scholar

White House (WH). (2010, May). White House, National Security Strategy. Available at: https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf Search in Google Scholar

World Economic Forum. (2020). Global risks report 2020: An unsettled world. Available at: https://reports.weforum.org/global-risks-report-2020/chapter-one-risks-landscape/ Search in Google Scholar

Zielinski, L., & Marino, D. J. (2020). How to leverage the telemedicine surge to create a profitable telehealth model. Healthcare Financial Management, Vol. 74, Issue 6, 36-40. Search in Google Scholar

Zorabedian, J. (2020 July 31). Facing growing cyber risks, hereʼs how organizations are mitigating the cost of a data breach. Forbes. Available at: https://www.forbes.com/sites/ibmsecurity/2020/07/31/facing-growing-cyber-risks-heres-how-organizations-are-mitigating-the-cost-of-a-data-breach/?sh=49579fcb4025 Search in Google Scholar