Abstract

Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.

Highlights

  • There are several parallels between information security and preventive medicine [1, 2, 3]

  • There is the need to initiate and maintain proactive measures and in preventive medicine, there is a need to engage in measures such as disease immunization and so on

  • An objective of the proposed research is to form an evaluation of how these factors are brought to bear on a Wireless Implanted Medical Devices (WIMD) patient’s experience

Read more

Summary

INTRODUCTION

There are several parallels between information security and preventive medicine [1, 2, 3]. An objective of the proposed research is to form an evaluation of how these factors are brought to bear on a WIMD patient’s experience Health behavior models, such as the HBM can be useful for increasing information security awareness [5]. [7] cited [8] in suggesting the theory of planned behavior (TPB) might be superior to the HBM in assessing relationships between the attitude, intention, and action for the sake of information security policymaking in an organizational setting. This may be exactly true in a purely corporate environment focused upon policy-making and compliance. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices

LITERATURE REVIEW
APPLYING THE HEALTH BELIEF MODEL TO THE STUDY
Perceived Susceptibility and the Impact of Cyber Influence
Perceived Threat and Cybersecurity Risk Communications
Perceived Benefits, Perceived Barriers, and Collaboration
Perceived Self-Efficacy and Cybersecurity Awareness
Findings
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.