• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对医院的网络攻击研究现状及可用最佳实践建议:范围综述。

The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.

机构信息

Institute of Global Health, Faculty of Medicine, University of Geneva, Campus Biotech, Chemin des Mines 9, 1202, Geneva, Switzerland.

出版信息

BMC Med Inform Decis Mak. 2019 Jan 11;19(1):10. doi: 10.1186/s12911-018-0724-5.

DOI:10.1186/s12911-018-0724-5
PMID:30634962
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6330387/
Abstract

BACKGROUND

The health sector has quickly become a target for cyberattacks. Hospitals are especially sensitive to these sorts of attacks as any disruption in operations or even disclosure of patient personal information can have far-reaching consequences. The objective of this study was to map the available literature on cyberattacks on hospitals and to identify the different domains of research, while extracting the recommendations and guidelines put forth in the literature.

METHODS

Four databases (PubMed, Web of Science, ProQuest, and Scopus) were searched using standardized and adapted search syntax in order to identify relevant manuscripts published between 1997 and 2017. These were screened by two reviewers and included or excluded based on inclusion and exclusion criteria. Data from articles were then extracted and analyzed.

RESULTS

The search identified 818 records of which 97 were included. Of the 97, 32% were published in 2017 while around 40% of the articles were published prior to the last three years. Six domains of research emerged through the analysis, which are included here: context and trends in cybersecurity (27.8%), connected medical devices and equipment (29.9%), hospital information systems (14.4%), raising awareness and lessons learned (6.2%), information security methodology (15.4%), and specific types of attacks (6.2%).

CONCLUSION

There is a generally growing interest in the research field, but the available literature remains limited in number. There are important aspects of cybersecurity (e.g. cloud storage and access management) as well as specific medical fields that rely on various medical devices that have been neglected. Recommendations are available, but comprehensive guidelines and standardized best practice measures are still necessary.

摘要

背景

卫生部门已迅速成为网络攻击的目标。医院对这类攻击特别敏感,因为任何运营中断,甚至是患者个人信息的泄露都可能产生深远的影响。本研究的目的是绘制针对医院的网络攻击的相关文献,并确定不同的研究领域,同时提取文献中提出的建议和指南。

方法

使用标准化和适应的搜索语法,在四个数据库(PubMed、Web of Science、ProQuest 和 Scopus)中进行搜索,以确定在 1997 年至 2017 年期间发表的相关文献。由两名评审员对这些文献进行筛选,并根据纳入和排除标准纳入或排除。然后提取和分析文章的数据。

结果

搜索共确定了 818 条记录,其中 97 条被纳入。在这 97 篇文章中,32%发表于 2017 年,而大约 40%的文章发表于过去三年之前。通过分析得出了六个研究领域,包括:网络安全的背景和趋势(27.8%)、联网医疗设备和仪器(29.9%)、医院信息系统(14.4%)、提高意识和经验教训(6.2%)、信息安全方法(15.4%)和特定类型的攻击(6.2%)。

结论

研究领域的兴趣普遍在增加,但现有文献的数量仍然有限。网络安全的一些重要方面(如云存储和访问管理)以及依赖各种医疗设备的特定医疗领域被忽视了。现已有建议,但全面的指南和标准化的最佳实践措施仍有必要。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/f189a680f0b0/12911_2018_724_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/4a193eef2e03/12911_2018_724_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/4b91922223b4/12911_2018_724_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/f189a680f0b0/12911_2018_724_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/4a193eef2e03/12911_2018_724_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/4b91922223b4/12911_2018_724_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cb9f/6330387/f189a680f0b0/12911_2018_724_Fig3_HTML.jpg

相似文献

1
The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.针对医院的网络攻击研究现状及可用最佳实践建议:范围综述。
BMC Med Inform Decis Mak. 2019 Jan 11;19(1):10. doi: 10.1186/s12911-018-0724-5.
2
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
3
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.
4
Cybersecurity Interventions in Health Care Organizations in Low- and Middle-Income Countries: Scoping Review.中低收入国家医疗机构的网络安全干预措施:范围综述。
J Med Internet Res. 2024 Nov 20;26:e47311. doi: 10.2196/47311.
5
Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.COVID-19 大流行下的医疗保健网络安全挑战与应对策略:范围综述。
J Med Internet Res. 2021 Apr 20;23(4):e21747. doi: 10.2196/21747.
6
Consideration of Cybersecurity Risks in the Benefit-Risk Analysis of Medical Devices: Scoping Review.医疗设备获益-风险分析中的网络安全风险考量:范围综述
J Med Internet Res. 2024 Dec 24;26:e65528. doi: 10.2196/65528.
7
Beyond the black stump: rapid reviews of health research issues affecting regional, rural and remote Australia.超越黑木树:影响澳大利亚地区、农村和偏远地区的健康研究问题的快速综述。
Med J Aust. 2020 Dec;213 Suppl 11:S3-S32.e1. doi: 10.5694/mja2.50881.
8
Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.医疗保健系统易受网络攻击及相关社会技术解决方案:系统评价。
J Med Internet Res. 2024 May 31;26:e46904. doi: 10.2196/46904.
9
Ethics of Procuring and Using Organs or Tissue from Infants and Newborns for Transplantation, Research, or Commercial Purposes: Protocol for a Bioethics Scoping Review.从婴儿和新生儿获取器官或组织用于移植、研究或商业目的的伦理问题:生物伦理学范围审查方案
Wellcome Open Res. 2024 Dec 5;9:717. doi: 10.12688/wellcomeopenres.23235.1. eCollection 2024.
10
Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature.医院自带设备安全挑战与解决方案:灰色文献系统评价。
JMIR Mhealth Uhealth. 2020 Jun 18;8(6):e18175. doi: 10.2196/18175.

引用本文的文献

1
The Role of the Organization in Promoting Information Security-Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study.组织在促进德国医院住院医师信息安全相关行为中的作用:横断面问卷调查研究
J Med Internet Res. 2025 Jan 7;27:e46257. doi: 10.2196/46257.
2
Legal implications for clinicians in cybersecurity incidents: A review.临床医生在网络安全事件中的法律责任:综述。
Medicine (Baltimore). 2024 Sep 27;103(39):e39887. doi: 10.1097/MD.0000000000039887.
3
Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.

本文引用的文献

1
A Roundtable Discussion: Thawing Out Healthcare Technology's 'Special Snowflake' Cybersecurity Challenges.一场圆桌讨论:化解医疗技术领域“特殊棘手”的网络安全挑战
Biomed Instrum Technol. 2017 Sep 2;51(s6):10-16. doi: 10.2345/0899-8205-51.s6.10.
2
The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.医疗技术管理在促进医疗设备网络安全方面的作用。
Biomed Instrum Technol. 2017 Sep 2;51(s6):19-25. doi: 10.2345/0899-8205-51.s6.19.
3
Cybersecurity Concerns and Medical Devices: Lessons From a Pacemaker Advisory.
医疗保健系统易受网络攻击及相关社会技术解决方案:系统评价。
J Med Internet Res. 2024 May 31;26:e46904. doi: 10.2196/46904.
4
Design and Pilot Study of a High-Fidelity Medical Simulation of a Hospital-Wide Cybersecurity Attack.医院范围网络安全攻击的高保真医学模拟设计与初步研究
Res Sq. 2024 Apr 5:rs.3.rs-3959502. doi: 10.21203/rs.3.rs-3959502/v1.
5
[Cybersecurity and use of ICT in the health sector].[网络安全与信息通信技术在医疗卫生领域的应用]
Aten Primaria. 2024 Mar;56(3):102854. doi: 10.1016/j.aprim.2023.102854. Epub 2024 Jan 13.
6
A resilient workforce: patient safety and the workforce response to a cyber-attack on the ICT systems of the national health service in Ireland.有弹性的劳动力:病人安全和劳动力对爱尔兰国家卫生服务的信息和通信技术系统遭受网络攻击的反应。
BMC Health Serv Res. 2023 Oct 17;23(1):1112. doi: 10.1186/s12913-023-10076-8.
7
Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry.受汽车行业启发的手术室可互操作医疗设备威胁评估与风险分析(TARA)
Healthcare (Basel). 2023 Mar 16;11(6):872. doi: 10.3390/healthcare11060872.
8
The role of messaging services in day-to-day practice in pediatric neurosurgery, advantages of a bubble network, and an international survey.信息服务在小儿神经外科日常实践中的作用、气泡网络的优势,以及一项国际调查。
Childs Nerv Syst. 2023 Mar;39(3):759-766. doi: 10.1007/s00381-022-05782-3. Epub 2022 Dec 19.
9
Integrated Blockchain-Deep Learning Approach for Analyzing the Electronic Health Records Recommender System.集成区块链-深度学习方法分析电子健康记录推荐系统。
Front Public Health. 2022 May 6;10:905265. doi: 10.3389/fpubh.2022.905265. eCollection 2022.
10
Blockchain Integration With Digital Technology and the Future of Health Care Ecosystems: Systematic Review.区块链与数字技术融合与医疗保健生态系统的未来:系统评价。
J Med Internet Res. 2021 Nov 2;23(11):e19846. doi: 10.2196/19846.
网络安全问题与医疗设备:来自起搏器咨询的经验教训
JAMA. 2017 Dec 5;318(21):2077-2078. doi: 10.1001/jama.2017.15692.
4
Your Money or Your Patient's Life? Ransomware and Electronic Health Records.要钱还是要你病人的命?勒索软件与电子健康记录。
Ann Intern Med. 2017 Oct 17;167(8):587-588. doi: 10.7326/M17-1312. Epub 2017 Sep 19.
5
Cybersecurity-A Serious Patient Care Concern.网络安全——患者护理的重大关切。
JAMA. 2017 Oct 10;318(14):1319-1320. doi: 10.1001/jama.2017.11986.
6
Security Techniques for the Electronic Health Records.电子健康记录的安全技术
J Med Syst. 2017 Aug;41(8):127. doi: 10.1007/s10916-017-0778-4. Epub 2017 Jul 21.
7
Cybersecurity and healthcare: how safe are we?网络安全与医疗保健:我们有多安全?
BMJ. 2017 Jul 6;358:j3179. doi: 10.1136/bmj.j3179.
8
Cybersecurity and the Medical Device Product Development Lifecycle.网络安全与医疗设备产品开发生命周期
Stud Health Technol Inform. 2017;238:76-79.
9
WannaCry, Cybersecurity and Health Information Technology: A Time to Act.想哭病毒、网络安全与健康信息技术:是时候采取行动了。
J Med Syst. 2017 Jul;41(7):104. doi: 10.1007/s10916-017-0752-1.
10
Cybersecurity awareness: Protecting data and patients.网络安全意识:保护数据和患者。
Nursing. 2017 Jun;47(6):65-67. doi: 10.1097/01.NURSE.0000516242.05454.b4.