The Relationship Between Cybersecurity and Public Health

The Relationship Between Cybersecurity and Public Health

Rita Komalasari
DOI: 10.4018/978-1-6684-6092-4.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this chapter, the authors discuss the relationship between cybersecurity and public health. They consider that open wellbeing logic may offer assistance. They explore the standardizing legitimization for—and moral limitations on—government engagement on the internet, as well as how to put these higher standards into reality through open wellbeing arrangement and education. In this open cyberhealth worldview, non-malicious dangers to organize vigor and flexibility are treated genuinely, as is the effect of arranged dangers and activities on wellbeing and health.
Chapter Preview
Top

Introduction

The ideas presented in the book “Current Trends in Cybersecurity and Educational Technology” are the foundation for the reviews included in this chapter. This chapter will use the academic community and the public. Take, for instance, a lecturer who works with health regulations and online learning from an educational technology standpoint. This chapter looks at the connection that exists between cybersecurity and public health. The following is how the chapter is organized: a literature-based technique was discussed in more detail in the beginning. Second, we present the literature review findings in the “Results.” Third, a theory-based approach for fusing fresh evidence is shown in the discussion section. This evidence includes the connection that exists between cybersecurity and public health. In the last portion of the report, titled “Conclusion,” we offer a solution, a recommendation, and suggestions for further study.

Cybersecurity and educational technology systems have become more popular (Jimenez & O'Neill, 2022). Recently, a concern has been raised regarding self-interested actions by private marketplaces or national health services that may not deliver adequate public benefits if we leave them to their own devices (Boettke & Powell 2021). The United Nations has a dedicated organization for worldwide public health called the World Health Organization. The greatest degree of health for all people is stated as the WHO's primary goal in its constitution. A growing number of these public goods are now part of WHO's mission, which has flourished. While the WHO monitors disease outbreaks, we also use it as a location for studies and classes on crisis management and for creating standards for readiness and response. Public goods that call for and provide benefits for all nations are known as global public goods. GPGs differ from other public goods in that they call for cooperation across states in a situation where no one state can compel another state to act. The World Health Organization's surveillance of infectious illnesses is a good example. The fact that these public goods are participatory is their second commonality.

In contrast to many others, a participatory public benefit calls on recipients to contribute more than just their tax dollars to its creation. Herd immunity is the poster child for participative public use. Herd immunity in public health necessitates vaccination, but in the context of technology, it necessitates device patching. In both situations, it becomes substantially more difficult for diseases to propagate after a certain proportion of the network is secured. Even if the production of GPGs requires international cooperation, it is essential to remember that individual governments play a necessary part in GPG supply (Brown & Susskind, 2020). Aside from the WHO's logistical support and direct provision of some of these goods, the organization collaborates closely with public health institutions. To keep illnesses at bay, these government health institutions work tirelessly (Nicola et al., 2020). However, the connection between cybersecurity and public health still needs to be explored. In the following section, we look at the method for searching for research relevant to the intertwined between cybersecurity and public health.

This review proposes a literature synthesis of research on the relationship between cybersecurity and public health. The current review's primary emphasis was on qualitative research and reported on the commons-based resources that promote healthy online health. On the one hand, we concentrated much of our focus on malware mitigation and the standardizing legitimization of—and moral limitations on—government engagement on the internet. We may better understand how to make these higher standards reality through open welfare arrangements and education. The purpose of compiling this information is to achieve two goals: (1) to shed light on the interplay between cybersecurity and public health; and (2) to highlight where further international health regulations are required.

Key Terms in this Chapter

LoA: Standards of assurance. It is a claim to a certain identity made during authentication that can be trusted to represent the claimant’s “real” identity with a given level of (identification) confidence. Higher degrees of assurance decrease the possibility of identity theft and boost transaction security. Still, they can also be more expensive and inconvenient for identity holders and other parties that rely on them, which might result in exclusion. Therefore, practitioners must consider the various LoA needs of different use cases. For instance, while some transactions—like making a medical appointment online—carry less risk than others, biometric-based verification is probably not acceptable for usage across all use cases.

WHO: The United Nations has a dedicated organization for worldwide public health called the World Health Organization. The greatest degree of health for all people is stated as the WHO’s primary goal in its constitution.

CWG: A group of security professionals, eventually referred to as the Conficker Working Group, did recognize that Conficker posed a threat to the whole internet. They started researching the worm and developing strategies to manage it soon after it appeared. Early participants in the all-volunteer CWG included representatives of Microsoft, a nonprofit research institute, and several organizations that oversaw top-level domains, as well as some independent security researchers and academics. Many of these participants knew one another via conferences and social media.

Cybersecurity: Protection from electronic assaults such as cyberwarfare.

Cyberhealth: The use the internet for telehealth.

GPG: Public goods that call for and provide benefits for all nations are known as global public goods. GPG differs from other public goods in that they call for cooperation across states in a situation where no one state can compel another state to act. The World Health Organization’s surveillance of infectious illnesses is a good example. The fact that these public goods are participatory is their second thing in common. In contrast to many others, a participatory public benefit calls on recipients to contribute more than just their tax dollars to its creation. Herd immunity is the poster child for a participative general help. Herd immunity in public health necessitates vaccination, but in the context of technology, it necessitates device patching. In both situations, it becomes substantially more difficult for diseases to propagate after a certain proportion of the network is secured.

Complete Chapter List

Search this Book:
Reset