Database Searches
The databases I’m going to look at are Computer Science Collection, Health Source – Nursing/Academic Edition, Computer Source, MEDLINE, and Consumer Health Complete – EBSCOhost, as well as FHSU’s library search.
Computer Science Collection searches
Search term: Cybersecurity in Healthcare. Number of results: 29
Search term: medical cybersecurity. Number of results: 19
Search term: cybersecurity. Number of results: 62,162
Health Source – Nursing/Academic Edition searches
Search term: cybersecurity in healthcare. Number of results: 5
Search term: healthcare security. Number of results: 3
Search term: cybersecurity. Number of results: 147
Computer Source searches
Search term: cybersecurity in healthcare. Number of results: 20
Search term: cybersecurity. Number of results: 1,919
Search term: medical cybersecurity. Number of results: 5
MEDLINE searches
Search term: cybersecurity in healthcare. Number of results: 41
Search term: cybersecurity. Number of results: 4,856
Search term: computer security. Number of results: 7,803
Consumer Health Complete – EBSCOhost
Search term: cybersecurity in healthcare. Number of results: 49
Search term: cybersecurity. Number of results: 183
Search term: computer security. Number of results: 311
FSHU library resources
Search term: implant cybersecurity. Number of results: 171
Search term: medical cybersecurity. Number of results: 2,812
Search term: cybersecurity in healthcare. Number of results: 1,799
Sources
From FHSU library resources. Term searched: implant cybersecurity
Baranchuk, A., Refaat, M. M., Patton, K. K., Chung, M. K., Krishnan, K., Kutyifa, V., Upadhyay, G., Fisher, J. D., & Lakkireddy, D. R. (2018, March 20). Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know? Journal of the American College of Cardiology. https://doi.org/10.1016/j.jacc.2018.01.023
From Computer Source. Term searched: medical cybersecurity
Ngamboé M., Berthier P., Ammari N., Dyrda K., Fernandez, J. M. (2020, October 7). Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED). International Journal of Information Security. https://doi.org/10.1007/s10207-020-00522-7
From Health Source: Nursing/Academic Edition. Term searched: cybersecurity
Kruse, C. S., Frederick, B., Jacobson, T., Monticone, D. K. (2016, August 19). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology & Health Care https://doi.org/10.3233/THC-161263
Benjamin, R., Kramer, D. B., Foo Kune, D., Auto de Medeiros, J., Yan, C., Xu, W., Crawford, T., Fu, K. (2017, April 13). Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists. Pacing & Clinical Electrophysiology. https://doi.org/0.1111/pace.13102
Annotation
The article I selected for annotation is Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists.
The motivation of the researchers to write this article was based on events concerning an alleged pacemaker vulnerability that could stop the pacemaker’s function. Succinctly discussed are the suspicious circumstances around said vulnerability. A summary of how negligently the firm released this information in contrast to how this type of information is typically treated immediately follows. The researchers conducted an experiment attempting to replicate the vulnerability but were unable to, implying that the original claims may have been motivated by financial gain. Overall, the article posits that patients are much better off with their therapeutic devices than without. When they have concerns, it’s best to consult medical professionals before acting on this type of information.
Comparing this source to the others in my list of references, I don’t consider it as helpful as others, but it does have use as an example of how the medical electronics industry conducts itself about cybersecurity concerns. This research aims to assure doctors and patients that, while not without risk, they can trust the devices currently in use. The researcher’s subtler point is that the trustworthiness of some sources seen in the news may be suspect. I see this as an objective and reliable source, albeit with a goal unrelated to my own.
While this research is divergent from the typical kind that I’m looking for, it helps show that the existing methods and standards of evidence are put in place for a reason and typically work. Outlined briefly is some information about FDA guidelines and their intervention in this case that could be valuable. It also describes some behind-the-scenes processes that may be useful to my investigation of cybersecurity standards in implants and what preventative measures are currently in place.