A cybersecurity primer for translational research.
نویسندگان
چکیده
Virtually all health care organizations have had at least one data breach since 2012. Most of the largest data breaches and Health Care Information Privacy and Accountability Act fines could have been prevented by the simplest of strategies. Each researcher must clearly understand his or her responsibilities and liability.
منابع مشابه
Cybersecurity as an Application Domain for Multiagent Systems
The science of cybersecurity has recently been garnering much attention among researchers and practitioners dissatisfied with the ad hoc nature of much of the existing work on cybersecurity. Cybersecurity offers a great opportunity for multiagent systems research. We motivate cybersecurity as an application area for multiagent systems with an emphasis on normative multiagent systems. First, we ...
متن کاملA Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen)
The Federal Aviation Administration (FAA) is developing the Cybersecurity Test and Evaluation Facility (CyTF) for the FAA Air Transportation System as it transitions to the Next Generation Air Transportation System (NextGen). This paper describes the goals, capabilities, architecture, current implementation, initial experience, lessons learned and future implementation of the CyTF. The FAA Air ...
متن کاملTwitter Sentiment Analysis: An Examination of Cybersecurity Attitudes and Behavior
This exploratory study examines the cybersecurity attitudes and actual behavior over time using the data collected on the social media microblogging platform, Twitter. We plan to use the sentiment analysis and text mining techniques on original tweets related to cybersecurity collected at two different time periods. Upon completion of this research, we would present the analysis of the relation...
متن کاملA Developmental Study on Assessing the Cybersecurity Competency of Organizational Information System Users
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter...
متن کاملSelf-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes
Research on cybersecurity competitions is still in its nascent state, and many questions remain unanswered, including how effective these competitions actually are at influencing career decisions and attracting a diverse participant base. The present research aims to address these questions through surveying a sample of excybersecurity competition participants from New York University’s Cyber-S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Science translational medicine
دوره 8 322 شماره
صفحات -
تاریخ انتشار 2016