{"id":384,"date":"2025-04-25T16:04:10","date_gmt":"2025-04-25T16:04:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dtayl079\/?page_id=384"},"modified":"2025-04-25T16:04:10","modified_gmt":"2025-04-25T16:04:10","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtayl079\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p>Darrian Taylor<\/p>\n\n\n\n<p>April 4, 2025<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\"><br>Cyber Victimization in the Healthcare Industry<\/h1>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Intro<\/h2>\n\n\n\n<p>The healthcare sector has become a major target for cybercriminals due to its reliance on digital systems and sensitive data. In the article \u201cCyber Victimization in the Healthcare Industry\u201d, authors Praveen, Kim, and Choi (2024) analyze how and why these institutions are frequently victimized. They use Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT) to study several cyberattacks involving healthcare organizations. Their goal is to better understand offender behavior, institutional vulnerabilities, and how both theories explain patterns in digital victimization. This review summarizes the article\u2019s research focus, methods, and findings, and connects its content to broader social science and cybersecurity themes discussed in class.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Relation to Social Sciences<\/h2>\n\n\n\n<p>This study directly relates to social science principles, particularly those found in criminology. Routine Activities Theory (RAT) and its cyber-focused extension, Cyber-RAT, explore how criminal behavior is influenced by the availability of targets, the presence of offenders, and the absence of protective measures. These ideas are widely used in social science research on crime prevention, victimization, and institutional risk. By applying these theories to cybercrime in healthcare, the study connects technical aspects of cybersecurity with broader societal concerns, such as infrastructure security and public policy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Research Questions and Hypotheses<\/h2>\n\n\n\n<p>The study seeks to address key concerns regarding the frequency and nature of cyberattacks on healthcare institutions. It explores questions such as:<br>\u2022 Why are healthcare organizations frequently targeted by cybercriminals?<br>\u2022 What characteristics make these institutions more vulnerable to cyber threats?<br><br>Although the authors do not explicitly outline formal hypotheses, their research is guided by the assumption that structural and operational vulnerabilities within healthcare systems contribute to the increased risk of cyber victimization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Research Methods<\/h2>\n\n\n\n<p>The study relies on qualitative research methods, specifically content analysis of documented cyberattacks in the healthcare sector. The authors review case studies from publicly available reports, forensic investigations, and breach disclosures. By applying Routine Activities Theory and Cyber-RAT, they categorize these incidents to identify recurring patterns in attack methods and institutional weaknesses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Data and Analysis<\/h2>\n\n\n\n<p>The study gathers data from cybersecurity reports, law enforcement records, and academic literature on healthcare-related cybercrime. The analysis focuses on categorizing cyber incidents based on their alignment with RAT and Cyber-RAT principles. Attacks involving ransomware, phishing schemes, and data breaches are evaluated to determine how the absence of security measures contributes to their success.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Connection to Course Concepts<\/h2>\n\n\n\n<p>The findings in this article align with key cybersecurity principles discussed in class, particularly those related to risk management, digital forensics, and the human element in cyber threats. The PowerPoint topics covering social engineering, threat modeling, and critical infrastructure vulnerabilities closely relate to the study\u2019s exploration of attacker behavior and institutional weaknesses. The application of criminological theories to cybersecurity further reinforces the interdisciplinary nature of the field.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Impact on Marginalized Groups<\/h2>\n\n\n\n<p>Healthcare organizations serve diverse populations, including many individuals who are socially and economically disadvantaged. When these institutions experience cyberattacks, the impact is disproportionately severe for marginalized communities. Limited access to alternative healthcare options, financial constraints, and a lack of digital literacy can leave these individuals more vulnerable to the consequences of data breaches and system disruptions. The study highlights the need for stronger security measures to protect sensitive patient information and ensure equitable healthcare access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Contributions to Society<\/h2>\n\n\n\n<p>This research offers valuable insights into the cybersecurity challenges facing the healthcare sector. By applying criminological theories to cyber victimization, the authors provide a framework for understanding offender motivations and institutional vulnerabilities. The study emphasizes the importance of proactive security policies, increased awareness, and improved technological safeguards. Its findings contribute to the ongoing efforts to enhance cybersecurity resilience in critical industries and protect vulnerable populations from digital threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Conclusion<\/h2>\n\n\n\n<p>The article by Praveen, Kim, and Choi (2024) offers a comprehensive analysis of cyber victimization in the healthcare industry, demonstrating how RAT and Cyber-RAT can be used to explain patterns of cybercrime. The study highlights the risks faced by healthcare institutions and underscores the need for stronger security measures. Its findings have significant implications for policymakers, cybersecurity professionals, and public health officials seeking to mitigate cyber threats in essential services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">References<\/h2>\n\n\n\n<p>Praveen, Y., Kim, M., &amp; Choi, K.-S. (2024). Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT). International Journal of Cybersecurity Intelligence and Cybercrime, 7(2). https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/2<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Darrian Taylor April 4, 2025 Cyber Victimization in the Healthcare Industry Intro The healthcare sector has become a major target for cybercriminals due to its reliance on digital systems and sensitive data. In the article \u201cCyber Victimization in the Healthcare Industry\u201d, authors Praveen, Kim, and Choi (2024) analyze how and why these institutions are frequently&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dtayl079\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28663,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/384"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/users\/28663"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/384\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/384\/revisions\/386"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/media?parent=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}