Publications

Digital Health Entrepreneurship. (2nd Ed.)
Prehospital and Disaster Medicine
The American Journal of Emergency Medicine
Network Security
Working as a Health Cybersecurity Specialist in The Health Information Workforce

American Journal of Roentgenology

How AI Can Hack and Protect Radiology

Benoit Desjardins, MD, PhD, Shandong Wu, PhD, Richard Staynings, MA, MS, E. Russell Ritenour, PhD.

Expected publication Summer 2024. American Journal of Roentgenology [AJR]

Abstract:
Artificial intelligence (AI) is rapidly growing in importance in the field of cybersecurity, for both defensive and offensive purposes, and will soon become the most important aspect of cybersecurity. In this paper, we will explore how AI can hurt and help radiology against cyberattacks. We will first cover the offensive aspects of AI, how cybercriminals are weaponizing artificial intelligence to improve their attacks against medical institutions. We will offer cutting-edge examples of how cyber-criminals are currently using AI to improve success of different types of attacks, such as phishing and intrusions of medical centers, which can disrupt the confidentiality, integrity and availability of medical data and images. We will next cover how cyber-defense teams at medical centers are using artificial intelligence to supplement the limited capabilities of humans to detect and defend against such cyberattacks.

 
Citation: Desjardins, B., Wu, S., Staynings, R., & Ritenour, R. (2024, Summer). How AI can Hack and protect Radiology, American Journal of Roentgenology [AJR]



Rise of the (anesthesia) machines. Novel technologies for new threats.

Fredrik Granholm, MD., Derrrick Tin. MD., & Richard Staynings, MS, May 2024

Excerpt: More is at play than what you may think!







Why IoT Needs to be Better Regulated to Protect Healthcare Against Cybercrime

Richard Staynings, 04 March 2024, Journal of mHealth

Excerpt:
Two of the greatest unmitigated risks today in the healthcare sector are the security of medical and other Internet of Things (IoT) devices and third-party vendor management (TPVM) including supply chain security. Covid-19 taught us that the integrity and availability of supply chains could be very unpredictable with the delivery of sub-par PPE or none at all. Rising geopolitical tensions and blockages of shipping routes have brought about new practices including near-shoring and safe-shoring, while the integrity of both the hardware and software supply chain have recently been challenged with extra substrates discovered in motherboards manufactured in China and numerous easily compromised backdoors built into the firmware of all sorts of computer devices.

Publisher: AME Publishing Company
Publication: Journal of mHealth
Language: English
Link to author copy:  Online article

Cite this work (APA): Staynings, R. (2022). How can Healthcare Tackle the Security Challenges of IoT/HIoT? Journal of mHealth. November 2022.


Digital Health Entrepreneurship. (2nd Ed.)

Publication Date: 07 October 2023
Editor: Arlen Mayers. 

Abstract:
This book presents a hands on approach to the digital health innovation and entrepreneurship roadmap for digital health entrepreneurs and medical professionals who are dissatisfied with the existing literature on or are contemplating getting involved in digital health entrepreneurship. Topics covered include regulatory affairs featuring detailed guidance on the legal environment, protecting digital health intellectual property in software, hardware and business processes, financing a digital health start up, cybersecurity best practice, and digital health business model testing for desirability, feasibility, and viability. Digital Health Entrepreneurship is directed to clinicians and other digital health entrepreneurs and stresses an interdisciplinary approach to product development, deployment, dissemination and implementation. It therefore provides an ideal resource for medical professionals across a broad range of disciplines seeking a greater understanding of digital health innovation and entrepreneurship.

Publisher:  Springer Cham
Language:  English
Pages:  236
DOI:  https://doi.org/10.1007/978-3-031-33902-8_11
Hardcover ISBN:  978-3-031-33901-1
Softcover ISBN:  978-3-031-33904-2
eText ISBN:  978-3-031-33902-8
Link to Author Copy: PDF

Cite this work (APA): Staynings, R. (2023). Cybersecurity. In Arlen Mayers (Eds.), Digital Health Entrepreneurship (2nd Ed.) (Chp. 11). Cham: Springer International Publishing.


Cyberthreats and Healthcare

Derrick Tin MBBS; Ryan Hata, MD; Richard Staynings, MS; Fredrik Granholm, MD.; Gregory Ciottone, MD, PhD.

13 July 2023. Prehospital and Disaster Medicine

Abstract:
Cyberattacks against healthcare have been growing at an alarming rate globally targeting the theft of clinical research intellectual property, personally identifiable information, and personal health information. Recent studies have also shown a concerning correlation between cyberattacks and patient morbidity and mortality rates. Many top security experts consider cyberattacks a top national security concern.This paper is a descriptive analysis of healthcare-related breaches in the United States in the past decade and an analysis of cybersecurity threats that are currently facing the industry.

Publisher: Cambridge University Press
Language:  English
DOI: https://doi.org/10.1017/S1049023X23002546
Link to author copy: PDF

Cite this work: Derrick Tin, Ryan Hata, Richard Staynings, et al., (2023). Prehospital and Disaster Medicine Volume 38 Supplement S1: 22nd Congress on Disaster and Emergency Medicine , May 2023 , pp. s89. DOI: https://doi.org/10.1017/S1049023X23002546


Cyberthreats: A primer for healthcare professionals

Derrick Tin, MBBS; Ryan Hata, MD; Fredrik Granholm, MD.,; Robert G. Ciottone, BS; Richard Staynings, MS; Gregory R. Ciottone, MD, PhD.

April 2023. The American Journal of Emergency Medicine.

Abstract:
Cyberattacks are one of the most widespread, damaging, and disruptive forms of action against healthcare entities. Data breaches, ransomware attacks, and other intrusions can lead to significant cost both in monetary and personal harm to those affected and may result in large payouts to cyber criminals, crashes of information technology systems, leaks of protected health and personal information, as well as fines and lawsuits. This study is adescriptive analysis of healthcare-related cyber breaches affecting 500 or more individuals in the past decade in the United States.
 
Publisher: Elsevier
Language:  English
DOI: https://doi.org/10.1016/j.ajem.2023.04.001
EPUB: 2023 Apr 5. PMID: 37061434.
ISSN (print): TBD
ISSN (online): TBD
Link to author copy: PDF

Cite this work (APA): D. Tin, R. Hata, F. Granholm, et al., (2023). Cyberthreats: A primer for healthcare professionals, American Journal of Emergency Medicine, https://doi.org/10.1016/j.ajem.2023.04.001

Cite this work (NLM): Tin D, Hata R, Granholm F, Ciottone RG, Staynings R, Ciottone GR. Cyberthreats: A primer for healthcare professionals. Am J Emerg Med. 2023 Jun;68:179-185. https://doi.org/10.1016/j.ajem.2023.04.001



How can Healthcare Tackle the Security Challenges of IoT/HIoT?

Richard Staynings, 22 November 2022, Journal of mHealth

Excerpt:
A greying of the population, a growing demand for more elective surgeries to correct joints damaged by increasing obesity and a sedentary lifestyle, and earlier diagnosis of medical ailments, are all leading to increased demand for medical intervention and healthcare services. With the recipients of most of these services already retired and therefore net beneficiaries of state healthcare services rather than economic contributors to health insurance or taxes, this is leading to a financial crunch for most health systems. One where demand vastly outstrips supply.

Publisher: AME Publishing Company
Plublication:Journal of mHealth
Language: English
Link to author copy: Online Version

Cite this work: Staynings, R. (2022). Why IoT Needs to be Better Regulated to Protect Healthcare Against Cybercrime Journal of mHealth. November 2022.


The threat from Russia continues to loom large

Richard Staynings 02 Nov 2022. Network Security.

Abstract: 
As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.

Publisher: Elsevier
Language:  English
DOI:  https://doi.org/10.12968/S1353-4858(22)70061-X
ISSN (print):  1353-4858
ISSN (online):  1872-9371

Cite this work: Staynings, R.  (2022). The threat from Russia continues to loom large. Network Security, (Journal) Volume 2022, Issue 10, https://doi.org/10.12968/S1353-4858(22)70061-X


Smart Health and Cybersecurity in the Era of Artificial Intelligence. In (Ed.), Computer-Mediated Communication.

2022. Ed. Indrakshi Dey

Abstract:
This book is an anthology of present research trends in Computer-mediated Communications (CMC) from the point of view of different application scenarios. Four different scenarios are considered: telecommunication networks, smart health, education, and human-computer interaction. The possibilities of interaction introduced by CMC provide a powerful environment for collaborative human-to-human, computer-mediated interaction across the globe.
Publisher:   IntechOpen (January 7, 2022)
Language:  English
DOI:  https://doi.org/10.5772/intechopen.97196
Hardcover:  158 pages
ISBN-10:  1839693096
ISBN-13:  978-1839693090

Cite this work Majumder, A. J. A. , & Veilleux, C. B.  (2021). Smart Health and Cybersecurity in the Era of Artificial Intelligence. In  (Ed.), Computer-Mediated Communication. IntechOpen. https://doi.org/10.5772/intechopen.97196

Working as a Health Cybersecurity Specialist in The Health Information Workforce. In (Ed.), The Health Information Workforce.


2021. Editors: Kerryn Butler-Henderson, Karen Day, Kathleen Gray

Abstract:
This book provides a detailed guide to the highly specialised but little known health information workforce - people who are health informaticians, digital health experts, and managers of health data, health information and health knowledge. It explains the basis of their unique functions within healthcare – their educational pathways and standards, professional qualifications and industry certifications, scholarly foundations and principles of good practice. It explores their challenges, including the rise of the health consumer movement, the drive to improve equity and quality in healthcare, new technologies such as artificial intelligence, and the COVID-19 infodemic. Case studies describe how practitioners in real-world roles around the world are addressing the digital transformation of health.

The Health Information Workforce: Current and Future Developments offers insights into a skilled group of people who are essential for healthcare services to function, for care providers to practice at the top of their scope, for researchers to generate significant insights, and for care consumers to be empowered participants in health systems. This book offers new perspectives for anyone working or intending to work in the health sector. It is a critical resource for health workforce planners, employers and educators seeking guidance on the specialised capabilities needed for high performance in an increasingly information-intensive sector.

Publisher: Cham Springer International 
Language: English
DOI:  https://doi.org/10.1007/978-3-030-81850-0
Hardcover ISBN:  978-3-030-81849-4
Softcover ISBN:   978-3-030-81852-4
Ebook ISBN:  978-3-030-81850-0

Cite this work: Williams, P. A. H., Cowley, S., Bolan, C., Fowle, K., & Staynings, R. (2021). Working as a Health Cybersecurity Specialist. In K. Butler-Henderson, K. Day, & K. Gray (Eds.), The Health Information Workforce : Current and Future Developments (pp. 225-236). Cham: Springer International Publishing.


Security Challenges and Approaches in Internet of Things

2017. Authors: Misra, Sridipta, Maheswaran, Muthucumaru, Hashmi, Salman

Abstract:
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT.

By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT.

The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Publisher: Cham Springer International 
Language: English
DOI:   https://doi.org/10.1007/978-3-319-44230-3_6
Print ISBN:  978-3-319-44229-7
Online ISBN:   978-3-319-44230-3