Exploring System Thinking Leadership Approaches to the Healthcare Cybersecurity Environment

Exploring System Thinking Leadership Approaches to the Healthcare Cybersecurity Environment

Darrell Norman Burrell, Amalisha Sabie Aridi, Quatavia McLester, Anton Shufutinsky, Calvin Nobles, Maurice Dawson, S. Raschid Muller
DOI: 10.4018/IJEACH.2021070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A Florida-based obstetrics and gynecology facility reported in February 2019 that they lost data because of a ransomware attack. In November 2017, 107,000 healthcare records were exposed from data breaches, and 340,000 records were exposed in December 2017. In 2019, 23,000 patient records at Critical Care, Pulmonary & Sleep Associates were compromised when a hacker gained access to an employee's email account and sent out phishing emails to the other employees, eventually exposing the patient data. On January 11, 2018, Adams Memorial Hospital and Hancock Regional Hospital, both in Indiana, experienced independent ransomware attacks, with Hancock Regional Hospital paying $50,000 in ransom. These incidents point to significant and complex cybersecurity risks for all healthcare organizations. Effectively managing these risks requires healthcare managers to develop system thinking and adaptive leadership skills. This paper explores the nuances and complexities around systems thinking in the healthcare cybersecurity environment.
Article Preview
Top

Introduction

System thinking is a holistic approach intended to analyze how the parts of the system interact and how the emergence changes as a whole entity (Nobles, 2018). Unlike reductionist thinking, which treats the world from a static, simple, and one-sided perspective, this holistic thinking emphasizes the complexity, dynamism, and entirety of the system and the interconnected and multifaceted relationships between the system components (Nobles, 2018).

Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry & Branley, 2018). Health care devices and their interconnectivity continue to evolve (Coventry & Branley, 2018). Many healthcare devices are now incorporated into the hospital network. There are approximately 10-15 connected devices per bed in United States hospitals (Coventry & Branley, 2018). The benefits of interconnection include automation, efficiency, error reduction, and remote monitoring (Coventry & Branley, 2018). EHRs make health information more generally accessible. With this evolving technology, health professionals can observe and modify implanted devices without patients ever needing to visit a hospital or have an invasive procedure (Coventry & Branley, 2018). The benefits of interconnectivity are altering the treatment of acute and chronic ailments.

Despite its improvements to clinical outcomes and patient care delivery, interconnection presents unique cybersecurity vulnerabilities. Healthcare faces more significant cyber risks than other sectors. Due to its fundamental weaknesses in its security posture, healthcare is one of the most targeted sectors globally (Martin, Martin, Hankin, Darzi, & Kinross, 2017). Common and emerging cyber threats in healthcare include: Data theft for financial gain; Data theft for impact; Ransomware; Data corruption; Denial of service attacks; Business email compromise, and the unwitting insider. In 2015 alone, 110 million patients in the United States had their data compromised (Martin et al., 2017). These numbers come from 81% of 223 organizations surveyed in 2015. About 50% of these providers believe they can defend themselves from cyberattack (Martin et al., 2017).

There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). Some healthcare centers shut down for good because they could not handle the post-attack disruption. COVID-19 has further intensified this developing issue. A typical cyberattack during the COVID-19 pandemic is hacking patients' medical devices (Morgan, 2020). Due to the pandemic, more patients are utilizing remote care (Morgan, 2020). The contrived facilities being utilized for individuals infected with the virus have generated more vulnerabilities for hackers to manipulate (Morgan, 2020). Phishing has exploded during the COVID-19 pandemic, with many scams coming from organizations like the Centers of Disease Control (CDC) and the World Health Organization (WHO). The healthcare industry is projected to spend $125 billion on cybersecurity from 2020 to 2025 (Morgan, 2020). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations' immediate need to utilize system thinking to prevent continuous loss.

Figure 1.

Deadly Khan, Brohi, & Zaman (2020)

IJEACH.2021070103.f01

Complete Article List

Search this Journal:
Reset
Volume 6: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 5: 1 Issue (2023)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing