Affiliation:
1. School of Science, Edith Cowan University, Joondalup, WA, Australia
Abstract
Purpose This paper proposes a novel cyber security risk governance framework and ontology for large Australian healthcare providers, using the structure and simplicity of the Unified Modelling Language (UML). This framework is intended to mitigate impacts from the risk areas of: (1) cyber-attacks, (2) incidents, (3) data breaches, and (4) data disclosures. Methods Using a mixed-methods approach comprised of empirical evidence discovery and phenomenological review, existing literature is sourced to confirm baseline ontological definitions. These are supplemented with Australian government reports, professional standards publications and legislation covering cyber security, data breach reporting and healthcare governance. Historical examples of healthcare cyber security incidents are reviewed, and a cyber risk governance UML presented to manage the defined problem areas via a single, simplified ontological diagram. Results A clear definition of ‘cyber security’ is generated, along with the ‘CYBER-AIDD’ risk model. Specific examples of cyber security incidents impacting Australian healthcare are confirmed as N = 929 over 5 years, with human factors the largest contributor. The CYBER-AIDD UML model presents a workflow across four defined classes, providing a clear approach to implementing the controls required to mitigate risks against verified threats. Conclusions The governance of cyber security in healthcare is complex, in part due to a lack of clarity around key terms and risks, and this is contributing to consistently poor operational outcomes. A focus on the most essential avenues of risk, using a simple UML model, is beneficial in describing these risks and designing governance controls around them.
Subject
Health Information Management,Computer Science Applications,Health Informatics,Health Policy
Reference83 articles.
1. Security of Critical Infrastructure Act 2018. 2022.
2. Health Care and Cybersecurity: Bibliometric Analysis of the Literature
3. Williams PA. Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations? In: 4th Australian Information Security Management Conference School of Computer and Information Science, Edith Cowan University, 5th December 2006.
4. Warren M, Leitch S. A participational security method for healthcare organisations. In: e-Society 2006: Proceedings of the IADIS International Conference e-Society 2006 2006, IADIS Press.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献