Accesso libero

Understanding Healthcare Cybersecurity Risk Management Complexity

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Barry, E., & Perlroth, N. (2020). Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack. The New York Times, available at: https://www.nytimes.com/2020/11/26/us/hospital-cyber-attack.html. Search in Google Scholar

Booher, H.R., & Minninger, J. (2003). Human systems integration in army systems acquisition in Handbook of Human Systems Integration, 663–698. Available at: https://doi.org/10.1002/0471721174.ch18. Search in Google Scholar

Boyce, M., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., & Lockett-Reynolds, J. (2011). Human Performance in Cybersecurity: a Research Agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 55, Issue 1, 1115–1119. DOI:10.1177/1071181311551233. Search in Google Scholar

Burrell, D.N., Bhargava, N., Springs, D., Dawson, M., Burton, S.L., Anderson, D.P., & Wright, J.B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 4, Issue 1, 13–28. Doi:10.4018/IJHIoT.2020010102. Search in Google Scholar

Carter, S., & Perriam, J. (2021). Cybersecurity, digital failure, and social harm. Understanding Digital Societies, 359–386, SAGE Publications. Available at: https://pure.itu.dk/en/publications/cybersecurity-digital-failure-and-social-harm. Search in Google Scholar

Chaiken, B.P., & Holmquest, D.L. (2003). Patient Safety: Modifying Processes to Eliminate Medical Errors. Nursing Outlook, Vol. 51, Issue 3: S21–4. DOI: 10.1016/s0029-6554(03)00097-6. Search in Google Scholar

Chamorro-Premuzic, T. (2023). Human Error Drives Most Cyber Incidents. Could A.I. Help? Harvard Business Review, available at: https://hbr.org/2023/05/human-error-drives-most-cyber-incidents-could-ai-help. Search in Google Scholar

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, Vol. 113, 48–52. Available at: https://www.maturitas.org/article/S0378-5122(18)30165-8/fulltext. Search in Google Scholar

Cummings, T.G., & Worley, C.G. (2014). Organization development and change. Mason, USA: South-Western Cengage Learning. Search in Google Scholar

Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60–67. Available at: https://doi.org/10.1177/0266382118773624. Search in Google Scholar

Dawson, M. (2020). Cybercrime: Internet Driven Illicit Activities and Behavior. Land Forces Academy Review, Vol. 25, Issue 4, 356–362. DOI: 10.2478/raft-2020-0043. Search in Google Scholar

Dent, E. (2003). The complexity science organizational development practitioner. Organization Development Journal, Vol. 21, Issue 2. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2297056. Search in Google Scholar

Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers & Security, Vol. 80, 74–89. DOI:10.1016/j.cose.2018.09.002. Search in Google Scholar

Fogelberg, D., & Frauwirth, S. (2010). A complexity science approach to occupation: Moving beyond the individual. Journal of Occupational Science, Vol. 17, Issue 3, 131–139. Available at: https://doi.org/10.1080/14427591.2010.9686687. Search in Google Scholar

Janofsky, A. (2019, October 06). Smaller Medical Providers Get Burned by Ransomware. Wall Street Journal, available at: https://www.wsj.com/articles/smaller-medical-providers-get-burned-by-ransomware-11570366801. Search in Google Scholar

Kayisoglu, G., Bolat, P., & Tam, K. (2022). Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime. The Journal of Navigation, Vol. 75, Issue 6, 1364–1388. Available at: https://doi.org/10.1017/S0373463322000534. Search in Google Scholar

Kennedy-Sims, C. (2021). Supply chain management in level I trauma care facilities: Can it determine patient care delivery and funding? (Order No. 28539929). Available from ProQuest Dissertations & Theses Global. Search in Google Scholar

Landsburg, A.C., Avery, L., Beaton, R., Bost, J.R., Comperatore, C., Khandpur, R., Malone, T.B., Parker, C., Popkin, S., & Sheridan, T.B. (2008). The art of successfully applying human systems integration. Naval Engineers Journal, Vol. 120, Issue 1, 77–107. Available at: https://doi.org/10.1111/j.1559-3584.2008.00113.x. Search in Google Scholar

Leape, L.L. (2000). Institute of Medicine medical error figures are not exaggerated. JAMA, Vol. 284, Issue 1, 95–7. DOI: 10.1001/jama.284.1.95. Search in Google Scholar

Levinthal, D.A., & Warglien, M. (1999). Landscape Design: Designing for Local Action in Complex Worlds. Organization Science, Vol. 10, Issue 3, 342–357. DOI:10.1287/orsc.10.3.342. Search in Google Scholar

McNeese, M.D., Cooke, N.J., D’Amico, A., Endsley, M.R., Gonzalez, C., Roth, E., & Salas, E. (2012). Perspectives on the role of cognition in cyber security. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 56, Issue 1, 268–271. DOI:10.1177/1071181312561063. Search in Google Scholar

Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA – Journal of Business and Public Administration, Vol. 9, Issue 3, 71–88. DOI: https://doi.org/10.2478/hjbpa-2018-0024. Search in Google Scholar

Passmore, W., Winby, S., Mohrman, S., & Vanasse, R. (2019). Reflections: Sociotechnical Systems Design and Organization Change. Journal of Change Management, Vol. 19, Issue 2, 67–85. DOI:10.1080/14697017.2018.1553761. Search in Google Scholar

Reason, J. (2000). Human error: models and management. British Medical Journal, Vol. 320, 768–770. Available at: https://doi.org/10.1136/bmj.320.7237.768. Search in Google Scholar

Senge, P.M. (2006). The Fifth Discipline: The Art & Practice of the Learning Organization. New York: Doubleday. Search in Google Scholar

Senge, P.M. (1990). The Fifth Discipline: The Art & Practice of The Learning Organization. New York: Doubleday/Currency. Search in Google Scholar

Senge, P.M. (2014). The fifth discipline field book: Strategies and tools for building a learning organization. New York: Crown Currency. Search in Google Scholar

Slangen, R. (2016). Understanding Cyber-risk by Investigating the Behaviour of Defender and Threat Agent Organisations: Why a Complex Adaptive Systems Perspective Contributes to Further Understanding Cyber-risk. TUDelft, Master Thesis. Available at: http://resolver.tudelft.nl/uuid:3951b6a2-db0c-4e69-8da8-9fa28bc28237. Search in Google Scholar

Shufutinsky, A. (2018). Organizational Assessment of a Biotechnology Firm’s Safety, Health, and Environmental Department through an Organizational Development Lens. International Journal of Interdisciplinary & Multidisciplinary Studies, Vol. 4, Issue 3. Search in Google Scholar

Shufutinsky, A. (2019). Tribalism and Clone Theory in New Leaders and the Resulting Degradation of Organizational Culture. Psychology & Behavioral Science International Journal, Vol. 10, Issue 2: 555788. DOI:10.19080/PBSIJ.2019.10.555788. Search in Google Scholar

Shufutinsky, A., Sibel, J., Beach, Saraceno, A., & Beach, A. (2020). O.D. for Robots? Implications of Industry 4.0 on Talent Acquisition and Development. Organization Development Journal, Vol. 38, Issue 3, 59–76. Available at: https://www.researchgate.net/publication/343671489_OD_for_Robots_Implications_of_Industry_40_on_Talent_Acquisition_and_Development. Search in Google Scholar

Siggelkow, N., & Rivkin, J.W. (2005). Speed and search: Designing organizations for turbulence and complexity. Organization Science, Vol. 16, Issue 2, 101–122. Search in Google Scholar

Simon, H.A. (1962). The Architecture of Complexity. Proceedings of the American Philosophical Society, Vol. 106, Issue 6, 467–82. Search in Google Scholar

Simpson, P. (2007). Organizing in the mist: A case study in leadership and complexity. Leadership & Organization Development Journal, Vol. 28, Issue 5, 465–482. DOI:10.1108/01437730710761751. Search in Google Scholar

Skarzauskiene, A. (2010). Managing complexity: Systems thinking as a catalyst of the organization’s performance. Measuring Business Excellence, Vol. 14, Issue 4, 49–64. DOI:10.1108/13683041011093758. Search in Google Scholar

Stacey, R. (2011). Strategic management and organizational dynamics: The challenge of complexity to ways of thinking about organizations (6th Edition). London: Pearson Education Ltd. Search in Google Scholar

Trist, E. & Emery, F. (2005). Organizational Behavior 2: Essential Theories of Process and Structure, 169. New York: Routledge. Available at: https://doi.org/10.4324/9781315702001. Search in Google Scholar

Vermeulen, P., Zietsma, C., Greenwood, R., & Langley, A. (2016). Strategic responses to institutional complexity. Strategic Organization, Vol. 14, Issue 4, 277–286. Search in Google Scholar

van der Kleij, R., & Leukfeldt, R. (2020). Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24–28, 2019, Washington DC, USA 10, 16–27. DOI:10.1007/978-3-030-20488-4_2. Search in Google Scholar

Walker, G.H., Stanton, N.A., Salmon, P.M., & Jenkins, D.P. (2008). A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theoretical Issues in Ergonomics Science, Vol. 9, Issue 6, 479–499. Search in Google Scholar

Wickham, M.H. (2019). Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis (Order No. 13861149). Available from ProQuest Dissertations & Theses Global. (2216485062). Search in Google Scholar

Willett, K.D. (2016). Cybersecurity decision patterns as adaptive knowledge encoding in cybersecurity operations. Doctoral dissertation, Stevens Institute of Technology. Search in Google Scholar

Yan, D. (2020). A Systems Thinking for Cybersecurity Modeling. arXiv preprint arXiv:2001.05734. Search in Google Scholar

Zhadan, A. (2023). World Economic Forum finds that 95% of cybersecurity incidents occur due to human error. Cybernews. Available at: https://cybernews.com/editorial/world-economic-forum-finds-that-95-of-cybersecurity-incidents-occur-due-to-human-error/. Search in Google Scholar

Zoto, E., Kianpour, M., Kowalski, S.J., & Lopez-Rojas, E.A. (2019). A sociotechnical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, Vol. 18, 65–75. Search in Google Scholar

eISSN:
2247-840X
Lingua:
Inglese