Publications

Digital Health Entrepreneurship. (2nd Ed.)
Prehospital and Disaster Medicine
The American Journal of Emergency Medicine
Network Security
Working as a Health Cybersecurity Specialist in The Health Information Workforce

American Journal of Roentgenology

How AI Can Hack and Protect Radiology

Benoit Desjardins, MD, PhD, Shandong Wu, PhD, Richard Staynings, MA, MS, E. Russell Ritenour, PhD.

Expected publication Spring 2024. American Journal of Roentgenology [AJR]

Abstract:

Artificial intelligence (AI) is rapidly growing in importance in the field of cybersecurity, for both defensive and offensive purposes, and will soon become the most important aspect of cybersecurity. In this paper, we will explore how AI can hurt and help radiology against cyberattacks. We will first cover the offensive aspects of AI, how cybercriminals are weaponizing artificial intelligence to improve their attacks against medical institutions. We will offer cutting-edge examples of how cyber-criminals are currently using AI to improve success of different types of attacks, such as phishing and intrusions of medical centers, which can disrupt the confidentiality, integrity and availability of medical data and images. We will next cover how cyber-defense teams at medical centers are using artificial intelligence to supplement the limited capabilities of humans to detect and defend against such cyberattacks.

 
Citation: 

Desjardins, B., Wu, S., Staynings, R., & Ritenour, R. (2023, Fall). How AI can Hack and protect Radiology, American Journal of Roentgenology [AJR]


Digital Health Entrepreneurship. (2nd Ed.)

Publication Date: 07 October 2023
Editor: Arlen Mayers.

Abstract:

This book presents a hands on approach to the digital health innovation and entrepreneurship roadmap for digital health entrepreneurs and medical professionals who are dissatisfied with the existing literature on or are contemplating getting involved in digital health entrepreneurship. Topics covered include regulatory affairs featuring detailed guidance on the legal environment, protecting digital health intellectual property in software, hardware and business processes, financing a digital health start up, cybersecurity best practice, and digital health business model testing for desirability, feasibility, and viability. Digital Health Entrepreneurship is directed to clinicians and other digital health entrepreneurs and stresses an interdisciplinary approach to product development, deployment, dissemination and implementation. It therefore provides an ideal resource for medical professionals across a broad range of disciplines seeking a greater understanding of digital health innovation and entrepreneurship. 

Citation:

Staynings, R. (2023). Cybersecurity. In Arlen Mayers (Eds.), Digital Health Entrepreneurship (2nd Ed.) (Chp. 11). Cham: Springer International Publishing.
Publisher:  Springer Cham
Language:  English
Pages:  236
DOI:  https://doi.org/10.1007/978-3-031-33902-8_11
Hardcover ISBN:  978-3-031-33901-1
Softcover ISBN:  978-3-031-33904-2
eText ISBN:  978-3-031-33902-8


Cyberthreats and Healthcare

Derrick Tin; Ryan Hata; Richard Staynings; Fredrik Granholm; Gregory Ciottone.

13 July 2023. Prehospital and Disaster Medicine

Abstract:

Cyberattacks against healthcare have been growing at an alarming rate globally targeting the theft of clinical research intellectual property, personally identifiable information, and personal health information. Recent studies have also shown a concerning correlation between cyberattacks and patient morbidity and mortality rates. Many top security experts consider cyberattacks a top national security concern.This paper is a descriptive analysis of healthcare-related breaches in the United States in the past decade and an analysis of cybersecurity threats that are currently facing the industry.

Citation: 

Derrick Tin, Ryan Hata, Richard Staynings, et al., (2023). Prehospital and Disaster Medicine Volume 38 Supplement S1: 22nd Congress on Disaster and Emergency Medicine , May 2023 , pp. s89. DOI: https://doi.org/10.1017/S1049023X23002546

Publisher: Cambridge University Press
Language:  English


Cyberthreats: A primer for healthcare professionals

Derrick Tin, MBBS; Ryan Hata, MD; Fredrik Granholm; Robert G. Ciottone; Richard Staynings; Gregory R. Ciottone, MD.

April 2023. The American Journal of Emergency Medicine.

Abstract:

Cyberattacks are one of the most widespread, damaging, and disruptive forms of action against healthcare entities. Data breaches, ransomware attacks, and other intrusions can lead to significant cost both in monetary and personal harm to those affected and may result in large payouts to cyber criminals, crashes of information technology systems, leaks of protected health and personal information, as well as fines and lawsuits. This study is adescriptive analysis of healthcare-related cyber breaches affecting 500 or more individuals in the past decade in the United States.

Citation: 

D. Tin, R. Hata, F. Granholm, et al., (2023). Cyberthreats: A primer for healthcare professionals, American Journal of Emergency Medicine, https://doi.org/10.1016/j.ajem.2023.04.001

Publisher: Elsevier
Language:  English
DOI: https://doi.org/10.1016/j.ajem.2023.04.001
ISSN (print): TBD
ISSN (online): TBD


The threat from Russia continues to loom large

Richard Staynings 02 Nov 2022. Network Security.

Abstract: 

As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.

Excerpt:

Until recently, the UK had not been on the receiving end of any severe cyber-attacks in relation to Putin’s invasion of Ukraine, but following the attack against software vendor, Advanced, in August 2022, the UK’s NHS 111 services were rendered unusable for much of the country.  As the threat from Russian Cyber attackers continues to loom large, we as a nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers 

Citation:

Staynings, R.  (2022). The threat from Russia continues to loom large. Network Security, (Journal) Volume 2022, Issue 10, https://doi.org/10.12968/S1353-4858(22)70061-X

Publisher: Elsevier
Language:  English
ISSN (print):  1353-4858
ISSN (online):  1872-9371


Smart Health and Cybersecurity in the Era of Artificial Intelligence. In (Ed.), Computer-Mediated Communication.

2022. Ed. Indrakshi Dey

Abstract:

This book is an anthology of present research trends in Computer-mediated Communications (CMC) from the point of view of different application scenarios. Four different scenarios are considered: telecommunication networks, smart health, education, and human-computer interaction. The possibilities of interaction introduced by CMC provide a powerful environment for collaborative human-to-human, computer-mediated interaction across the globe.


Citation:

Majumder, A. J. A. , & Veilleux, C. B.  (2021). Smart Health and Cybersecurity in the Era of Artificial Intelligence. In  (Ed.), Computer-Mediated Communication. IntechOpen. https://doi.org/10.5772/intechopen.97196

Publisher:   Intechopen (January 7, 2022)
Language:  English
DOI:  https://doi.org/10.5772/intechopen.97196
Hardcover:  158 pages
ISBN-10:  1839693096
ISBN-13:  978-1839693090


Working as a Health Cybersecurity Specialist in The Health Information Workforce. In (Ed.), The Health Information Workforce.


2021. Editors: Kerryn Butler-Henderson, Karen Day, Kathleen Gray

Abstract:

This book provides a detailed guide to the highly specialised but little known health information workforce - people who are health informaticians, digital health experts, and managers of health data, health information and health knowledge. It explains the basis of their unique functions within healthcare – their educational pathways and standards, professional qualifications and industry certifications, scholarly foundations and principles of good practice. It explores their challenges, including the rise of the health consumer movement, the drive to improve equity and quality in healthcare, new technologies such as artificial intelligence, and the COVID-19 infodemic. Case studies describe how practitioners in real-world roles around the world are addressing the digital transformation of health.

The Health Information Workforce: Current and Future Developments offers insights into a skilled group of people who are essential for healthcare services to function, for care providers to practice at the top of their scope, for researchers to generate significant insights, and for care consumers to be empowered participants in health systems. This book offers new perspectives for anyone working or intending to work in the health sector. It is a critical resource for health workforce planners, employers and educators seeking guidance on the specialised capabilities needed for high performance in an increasingly information-intensive sector.

Citation:

Williams, P. A. H., Cowley, S., Bolan, C., Fowle, K., & Staynings, R. (2021). Working as a Health Cybersecurity Specialist. In K. Butler-Henderson, K. Day, & K. Gray (Eds.), The Health Information Workforce : Current and Future Developments (pp. 225-236). Cham: Springer International Publishing.
 
Publisher: Cham Springer International 
Language: English
DOI:  https://doi.org/10.1007/978-3-030-81850-0
Hardcover ISBN:  978-3-030-81849-4
Softcover ISBN:   978-3-030-81852-4
Ebook ISBN:  978-3-030-81850-0


Security Challenges and Approaches in Internet of Things

2017. Authors: Misra, Sridipta, Maheswaran, Muthucumaru, Hashmi, Salman

Abstract:

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT.

By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT.

The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Publisher: Cham Springer International 
Language: English
DOI:   https://doi.org/10.1007/978-3-319-44230-3_6
Print ISBN:  978-3-319-44229-7
Online ISBN:   978-3-319-44230-3