Professional Documents
Culture Documents
Annotated Bibliography
Joella Crosby
Capella University
ANNOTATED BIBLIOGRAPHY 2
Information Summary
The purpose of this annotation bibliography is to examine and provide a clear and concise
summary of relevant scholarly literature with regard to the security and privacy challenges
present in healthcare information systems. In particular, this paper explores literature related to
the cybersecurity risks that healthcare information systems are exposed to as a result of the use of
Bring Your Own Devices (BYOD). The examination of the literature has shed light on several
key takeaways. First, security and privacy issues in information systems has been a concern that
is as old as the advent of such systems, and the increased adoption of healthcare information
technologies in recent years has exposed the healthcare system to these security challenges.
Second, the security challenges in information systems, and healthcare information systems for
that matter, is an area that has been widely researched and numerous solutions advanced.
Third, the increased need for enhanced connectivity and more efficient information
exchange within the healthcare system has led to the rapid adoption and utilization of the
cyberspace. Fourth, BYOD is an emerging information technology trend that has is continuously
being embraced by many hospitals and healthcare organizations due to the appeal of value that it
brings - users can conveniently access organizational systems and networks and the organization
does not have to spend anything on purchasing the devices. Fifth, security and privacy challenges
related to cybersecurity has also been moderately explored. But, BYOD devices have added a
new dimension to these security and privacy challenges further threatening sensitive patient
and how healthcare managers may protect their systems and networks from cyberattacks while
using BYOD. There is an urgent need, therefore, to explore this area to ensure sensitive patient
information is secure and the real benefits of using BYOD have been adequately harnessed.
ANNOTATED BIBLIOGRAPHY 3
Annotated Bibliography
Al-Ameen, M., Liu, J., & Kwak, K. (2013). Security and Privacy Issues in Wireless Sensor
Networks for Healthcare Applications. Journal of Medical Systems, 36(1). 93-101. Doi:
10.1007/s10916-010-9449-4
The purpose of this paper was to examine the various security and privacy issues
that are present in healthcare wireless sensor networks. The authors noted that within the
healthcare system, there has been a meteoritic rise in the utilization of wireless sensor
networks with numerous applications already developed and in use. It was further noted
that the wireless nature of most devices and applications has lead to heightened security
and privacy concerns. The paper describes in detail and evaluates the security and privacy
problems in these networks and provide possible measures that can be used to curtail
Al-Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., & Bourgeois, F. C. (2016). A
mobile app development guideline for hospital settings: Maximizing the use of and
minimizing the security risks of “bring your own devices” policies. Journal of Medical
http://doi.org/10.2196/mhealth.4424
The purpose of this study was to investigate the use of mobile applications within
the hospital environment and provide guidelines for mobile app development in
healthcare settings to ensure that the security risks of BYOD devices have been
minimized. To improve patient care and work processes, numerous hospitals are today
working on introducing mobile applications. However, the authors note that it will be
hugely costly and inconvenient for the hospitals to purchase mobile devices for their staff
ANNOTATED BIBLIOGRAPHY 4
only for use within the healthcare environment. That is why allowing the healthcare
However, considering the security risks posed by BYOD devices, it is important that the
mobile apps are developed with clear guidelines that will facilitate security enhancements
in BYOD.
Al-Janabi, S., Al-Shourbaji, I., Shojofar, M., & Shamshirband, S. (2017). Survey of main
challenges (security and privacy) in wireless body area networks for healthcare
https://doi.org/10.1016/j.eij.2016.11.001
This study examined the various challenges facing wireless body area networks in
healthcare with particular attention of the security and privacy concerns. Wireless body
area networks are a mushrooming technology trend in healthcare that uses wearable
devices to facilitate the monitoring and collection of patients’ health record data. Once
such sensitive data is collected, it is important that the system has high security and
privacy measures to protect these data while being utilized by healthcare professionals.
The authors of this study examine these networks at length and provide concrete and
state-of-the-art measures that can be employed to ensure that the privacy and security of
Ayatollahi, H., & Shagerdi, G. (2017). Information Security Risk Assessment in Hospitals. The
http://doi.org/10.2174/1874431101711010037
The study assesses the various risks that affect the information security of
healthcare information systems. The authors noted that although there have been
ANNOTATED BIBLIOGRAPHY 5
numerous efforts by researchers to categorize information security risks, there are still
many more unknown risks within the hospital environment that might seriously threaten
critical that the underlying causes of these security risks are effectively identified,
Bhartiya, S., & Mehrota, D. (2013). Threats and challenges to security of electronic health
records. In K. Singh, & A.K. Awasthi (Eds.), Quality, Reliability, Security and
Healthcare has always been an issue that is both complex and sensitive. Over the
past decade, huge strides have been taken to enhance the quality of services and care
technologies. This has led to the automation of healthcare activities, and electronic health
records form an integral part of this integration. However, despite the numerous benefits
that such health information systems have brought, they have also been accompanied by
numerous challenges chief among them the issue of data security. This book chapter
comprehensively studies and identifies the various security threats to hospital health
information systems. In addition, these security threats are categorized, rated, and real-
time scenarios for each examined. The chapter concludes by providing recommendations
Bromwich, M., & Bromwich, R. (2016). Privacy risks when using mobile devices in health
http://doi.org/10.1503/cmaj.160026
ANNOTATED BIBLIOGRAPHY 6
The purpose of this study was to examine the various privacy risks associated
with the use of mobile devices in healthcare. The authors pointed out that mobile devices
are increasingly being used within the healthcare environment to provide healthcare
However, the use of these devices within the healthcare setting has also brought
numerous risks including insecure data storage and privacy breaches. The study therefore
tries to create an awareness of these privacy risks associated with the use of mobile
Cavett, A. L. (2016). Using security risk analysis: Is the bring your own device policy becoming
a liability risk within healthcare. Purdue University Open Access Theses, 757,
https://docs.lib.purdue.edu/open_access_theses/757
determine whether BYOD has become the new frontier for security and privacy concerns
the liability risk of BYOD within hospitals, the study also sought to establish how the
security risks prevalent in such personal devices compares with the security risk
emanating from wired desktop computers. Although it was determined that BYOD
devices have a lower security risk that wired desktop computers, the security risk was
still substantial enough and so effective measures should be taken to address such
challenges.
ANNOTATED BIBLIOGRAPHY 7
Chen, H., Li, J., Hoang, T., & Lou, X. (2013). Security challenges of BYOD: a security
The purpose of this study was to explore the various security challenges that users
and organizations expose themselves to as a result of the utilization of Bring Your Own
Devices (BYOD) at work. After the identification of the BYOD security risks and
challenges, the paper goes on further to examine current literature on the awareness,
training, and education approaches and frameworks that can be used to motivate users to
commit to relevant policies and best practices of BYOD. The paper established that one
of the most significant factors in addressing BYOD security threats is user accountability.
Ernest, E. O., Sunday, A. I., & Oyindolapo, K. (2015). Electronic health record systems and
http://eprints.covenantuniversity.edu.ng/5326/1/Paper%2054.pdf
The purpose of this study was to explore the cyber security challenges inherent to
commonplace in today’s world. Health information systems help preserve patient safety
and care through more efficient information exchange. However, such exchange of
information within the cyberspace, albeit providing numerous benefits to care delivery
and patient outcomes, exposes sensitive patient information to identity theft and severe
privacy violations. The research therefore examines cybersecurity issues in the medical
ANNOTATED BIBLIOGRAPHY 8
field today and measures that can be implemented to secure patient information within
Garba, A. B., Amarego, J., Murray, D., & Kenworthy, W. (2015). Review of the Information
Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments.
https://doi.org/10.1080/15536548.2015.1010985
The purpose of this study was to analyze the security and privacy challenges that
accrue from the utilization of bring your own devices at work. The authors noted that the
equally rapid adoption of information technologies has led to the emergence of evolving
trends such as BYOD. In attempts to improve productivity and efficiency, BYOD devices
have been used to rapidly transform organizational activities and operations. However,
there exists many security and privacy challenges in BYOD environments that should be
Kumar, P., & Lee, H.-J. (2012). Security issues in healthcare applications using wireless medical
This study comprehensively explores the various security issues that accompany
the use of healthcare applications that utilizes wireless medical sensor networks. The
projects and highlights their security in the process. The use of healthcare applications is
enhancing the quality of care as well as patient outcomes. Through the use of healthcare
applications for remote monitoring, healthcare professionals are able to collect sensitive
ANNOTATED BIBLIOGRAPHY 9
data that helps foster better care. However, the sensitive nature of such information
means that security considerations are mandatory to ensure data privacy. Therefore, the
study identified the various security risks, requirements, and mechanisms for such
Kruse, C. S., Fredrick, B., Jacobson, T., & Monticone, K. (2016). Cybersecurity in healthcare: A
systematic review of modern threats and trends. Technology and Healthcare, 25(2). 1-10.
DOI 10.3233/THC-161263
academic literature. The researchers stated that the primary reason why majority of
healthcare information systems are vulnerable to modern threats and trends is due to
failure of health organizations to stay abreast of such threats. The authors concluded that
cybersecurity is a real threat for healthcare systems since the healthcare sector has
consistently lagged behind other industries when it comes to securing vital information.
Guidelines on how to enhance the security and privacy of patient information from cyber-
Lunar, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health
9. DOI: 10.3233/THC-151102
The purpose of this qualitative systematic review was to examine the cyberthreats
that health information systems face. Recent legislations have empowered healthcare
providers and organizations to embrace and adopt health information systems that fosters
information systems has created a ready pool of critical patient information increasing the
risk of cybercrime. Both external and internal security issues including cyberterrorism
Mehraeen, E., Ghazisaeedi, M., Farzi, J., & Mirshekari, S. (2017). Security challenges in
The purpose of this study was to determine the security challenges that are present
the year 2000 and 2015. Healthcare data represents very sensitive information that should
never be allowed to land at the hands of unauthorized persons if the security and privacy
of the patients are to be protected. However, even in progressed technologies that are
used to store healthcare data like cloud computing, cyber gaps remain an important
vulnerability. Successful cyberattacks can have devastating effects and pose adverse
impacts on the privacy and security of the patients. It is therefore important that
facing healthcare cloud computing and how to properly address them. The study
therefore investigates and outlines the various security challenges in cloud computing and
Octavia, T., Yanti, T., & Prabowo, H. (2016). Security and privacy challenge in Bring Your Own
10.1109/ICIMTech.2016.7930328
ANNOTATED BIBLIOGRAPHY 11
have had to deal with is Bring Your Own Devices to Work (BYOD). The increase in the
diversity of tools and platforms where organizational data has to be kept means that it is
almost inevitable for employees today to use their cellular phones, smartphones, personal
computers, tablets, and other personal devices at work. However, for organizations to
reap the full benefits of the utilization of BYOD devices in healthcare, it is important that
all privacy and security issues that are associated with the use of such devices are
accurately identified and effectively addressed. The purpose of this study was therefore to
examine the security and privacy issues involved in BYOD use and provide
Olalere, M., Mahmod, R., & Abdullah, A. (2015). A review of bring your own devices on
https://doi.org/10.1177/2158244015580372
This study reviews security issues related to Bring Your Own Devices (BYOD) in
healthcare. The proliferation of mobile devices coupled with the mushrooming of cloud-
based applications has increased mobile computing within the healthcare environment.
The increased reliance on mobile computing means that workers today bring their own
mobile devices at work and use them to facilitate organizational activities and functions.
However, the policy of allowing BYOD devices at the workplace has exposed healthcare
foundation for BYOD by examining the various tenets of BYOD in healthcare. Security
mainly target infrastructure, data, money, and devices. The threat of cyberattacks is real
and present in healthcare and has devastating effects including the loss of critical and
sensitive patient information. Therefore, the purpose of this study was to highlight the
significantly improved the healthcare industry but unless the security and privacy issues
are affectively addressed, the safe delivery of such benefits could be short-lived.
Sansurooh, K., & Williams, A. H. P. (2014). BYOD in ehealth: Herding Cats and Stable Doors,
In the recent past, there has been a widespread use of BYOD devices in the work
networks, resources, and applications. The utilization of personal devices at the work
environment brings about great appeal and value due to the ease of use as well as the
lurking cyber criminals who are seriously targeting healthcare information for identity
theft and other malicious drives, the use of BYOD devices within the healthcare
environment has created additional vulnerabilities that could put patient sensitive
information at serious risks. This study extensively analyzed the issue of cyber security in
ANNOTATED BIBLIOGRAPHY 13
healthcare as related to Bring Your Own Devices at work in order to provide a better
Vorakulpipat, C., Sirapaisan, S., Rattanalerdnosorn, E., & Savangskuk, V. (2017). A Policy-
https://doi.org/10.1155/2017/2057260
It is true that many organizations today allow their employees to bring personal
devices at work and use such personal devices to access organizational systems and
networks. This is the phenomenon known as Bring Your Own Devices (BYOD).
However, majority of these organizations have also overlooked the potential privacy and
security threats to data that such devices bring. The purpose of this review is therefor to
consider a probable framework that can facilitate the preservation of privacy and
305–316. http://doi.org/10.2147/MDER.S50048
vulnerabilities in medical devices. The researchers pointed out that increased connectivity
of healthcare computer networks in the recent past has increasingly exposed medical
devices to cybersecurity, something that they were previously used to. It is therefore
important for stakeholders within the healthcare environment to ensure that effective
measures have been pit in place to address the new challenge of cybersecurity and protect
sensitive patient information from falling into the wrong hands. This study reviewed the
ANNOTATED BIBLIOGRAPHY 14
complex issues and factors at play within this insecure environment, identifies the various