Publications

Cybersecurity. In (Ed.), Digital Health Entrepreneurship. (2nd Ed.) 

Expected Publication Date 2023. Editors: Sharon Wulfovich & Arlen Mayers.

Abstract:

This book presents a hands on approach to the digital health innovation and entrepreneurship roadmap for digital health entrepreneurs and medical professionals who are dissatisfied with the existing literature on or are contemplating getting involved in digital health entrepreneurship. Topics covered include regulatory affairs featuring detailed guidance on the legal environment, protecting digital health intellectual property in software, hardware and business processes, financing a digital health start up, cybersecurity best practice, and digital health business model testing for desirability, feasibility, and viability. Digital Health Entrepreneurship is directed to clinicians and other digital health entrepreneurs and stresses an interdisciplinary approach to product development, deployment, dissemination and implementation. It therefore provides an ideal resource for medical professionals across a broad range of disciplines seeking a greater understanding of digital health innovation and entrepreneurship. 


First Edition ISBN
Print ISBN:  9783030127183, 3030127184 
eText ISBN:  9783030127190, 3030127192



The threat from Russia continues to loom large

Richard Staynings 02 Nov 2022. Network Security.

Abstract: 

As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.
 

Reference:

Staynings, R.  (2022). The threat from Russia continues to loom large. Network Security, (Journal) Volume 2022, Issue 10, https://doi.org/10.12968/S1353-4858(22)70061-X

Publisher: Elsevier
Language: English
ISSN (print): 1353-4858
ISSN (online): 1872-9371



Smart Health and Cybersecurity in the Era of Artificial Intelligence. In (Ed.), Computer-Mediated Communication.

2022. Ed. Indrakshi Dey

Abstract:

This book is an anthology of present research trends in Computer-mediated Communications (CMC) from the point of view of different application scenarios. Four different scenarios are considered: telecommunication networks, smart health, education, and human-computer interaction. The possibilities of interaction introduced by CMC provide a powerful environment for collaborative human-to-human, computer-mediated interaction across the globe.
 

Reference:

Majumder, A. J. A. , & Veilleux, C. B.  (2021). Smart Health and Cybersecurity in the Era of Artificial Intelligence. In  (Ed.), Computer-Mediated Communication. IntechOpen. https://doi.org/10.5772/intechopen.97196
 
 
Publisher: ‎ Intechopen (January 7, 2022)
Language: ‎ English
Hardcover: ‎ 158 pages
ISBN-10: ‎ 1839693096
ISBN-13: ‎ 978-1839693090
 
 

Working as a Health Cybersecurity Specialist in The Health Information Workforce. In (Ed.), The Health Information Workforce.

2021. Editors: Kerryn Butler-Henderson, Karen Day, Kathleen Gray
 

Abstract:

This book provides a detailed guide to the highly specialised but little known health information workforce - people who are health informaticians, digital health experts, and managers of health data, health information and health knowledge. It explains the basis of their unique functions within healthcare – their educational pathways and standards, professional qualifications and industry certifications, scholarly foundations and principles of good practice. It explores their challenges, including the rise of the health consumer movement, the drive to improve equity and quality in healthcare, new technologies such as artificial intelligence, and the COVID-19 infodemic. Case studies describe how practitioners in real-world roles around the world are addressing the digital transformation of health.  
 
The Health Information Workforce: Current and Future Developments offers insights into a skilled group of people who are essential for healthcare services to function, for care providers to practice at the top of their scope, for researchers to generate significant insights, and for care consumers to be empowered participants in health systems. This book offers new perspectives for anyone working or intending to work in the health sector. It is a critical resource for health workforce planners, employers and educators seeking guidance on the specialised capabilities needed for high performance in an increasingly information-intensive sector.
 

Reference: 

Williams, P. A. H., Cowley, S., Bolan, C., Fowle, K., & Staynings, R. (2021). Working as a Health Cybersecurity Specialist. In K. Butler-Henderson, K. Day, & K. Gray (Eds.), The Health Information Workforce : Current and Future Developments (pp. 225-236). Cham: Springer International Publishing.


Hardcover ISBN:        978-3-030-81849-4
Softcover ISBN:          978-3-030-81852-4
Ebook ISBN:               978-3-030-81850-0
DOI:                             https://doi.org/10.1007/978-3-030-81850-0
 
 
 
 

Security Challenges and Approaches in Internet of Things

2017. Authors: Misra, Sridipta, Maheswaran, Muthucumaru, Hashmi, Salman

Abstract:

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT.

By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT.

The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.


Print ISBN:            978-3-319-44229-7
Online ISBN:         978-3-319-44230-3
DOI:                       https://doi.org/10.1007/978-3-319-44230-3_6