All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Data breaches in healthcare: security mechanisms for attack mitigation

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21460%2F24%3A00379045" target="_blank" >RIV/68407700:21460/24:00379045 - isvavai.cz</a>

  • Alternative codes found

    RIV/68407700:21730/24:00379045

  • Result on the web

    <a href="https://doi.org/10.1007/s10586-024-04507-2" target="_blank" >https://doi.org/10.1007/s10586-024-04507-2</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/s10586-024-04507-2" target="_blank" >10.1007/s10586-024-04507-2</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Data breaches in healthcare: security mechanisms for attack mitigation

  • Original language description

    The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we conduct a systematic review of existing solutions for data breach mitigation in healthcare, analysing 99 research papers. There is a growing trend in research emphasising the security of electronic health records, data storage, access control, and personal health records. The analysis identified the adoption of advanced technologies, including Blockchain and Artificial Intelligence, alongside encryption in developing resilient solutions. These technologies lay the foundations for addressing the prevailing cybersecurity threats, with a particular focus on hacking or malicious attacks, followed by unauthorised access. The research highlights the development of strategies to mitigate data breaches and stresses the importance of technological progress in strengthening data security. The paper outlines future directions, highlighting the need for continuous technological progress and identifying the gaps in the attack mitigations.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Cluster Computing

  • ISSN

    1386-7857

  • e-ISSN

    1573-7543

  • Volume of the periodical

    27

  • Issue of the periodical within the volume

    7

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    16

  • Pages from-to

    8639-8654

  • UT code for WoS article

    001201477900004

  • EID of the result in the Scopus database

    2-s2.0-85190445699