{"id":309,"date":"2024-09-25T21:15:56","date_gmt":"2024-09-25T21:15:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/?page_id=309"},"modified":"2024-09-25T21:40:30","modified_gmt":"2024-09-25T21:40:30","slug":"article-review-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/article-review-1\/","title":{"rendered":"Article review #1"},"content":{"rendered":"\n<p>Article Review #1: Cyber Victimisation in the Healthcare Industry<\/p>\n\n\n\n<p>Jahmir brown&nbsp;<\/p>\n\n\n\n<p>Cybersecurity and the Social Sciences (CYSE 201S)<\/p>\n\n\n\n<p>Diwakar Yalpi<\/p>\n\n\n\n<p>October 2<\/p>\n\n\n\n<p><strong>Article Review #1: Cyber Victimisation in the Healthcare Industry<\/strong><\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;Analysing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)&#8221; explores the increasing vulnerability of the healthcare industry to cyber-attacks. This Research focus on the fact that make healthcare systems appealing targets as well as the reason behind these attacks.By applying Routine Activities Theory (RAT)and Cyber-Routine Activities Theory (cyber-Rat),the authors intend to establish a theoretical framework for understanding the conditions under which cyber victimisation happens in the healthcare industry.&nbsp;<\/p>\n\n\n\n<p><strong>Relation to Social Science Principles<\/strong><\/p>\n\n\n\n<p>Social science topics are closely related to this topic, especially those that look at how technology interacts with social structures and human behaviour. Having a vital social institution, the healthcare sector bears particular dangers because it deals with a lot of sensitive data. While Cyber-RAT focuses on digital behaviours and demonstrates how technological improvements change traditional social relationships and create new vulnerabilities, RAT describes how offenders target industries with valuable assets. This research is vital in understanding how societal institutions may be safeguarded in an increasingly digital world.<\/p>\n\n\n\n<p><strong>Research Methods<\/strong><\/p>\n\n\n\n<p>Both qualitative and quantitative research methodologies are used in this study. In the qualitative part, case studies from healthcare companies with data breaches are analysed, and trends in attacker motivations and attack strategies are looked at. Through statistical analysis of cyber incidents reported in the healthcare industry, quantitative data is obtained. By using a mixed-method approach, the authors are able to examine the problem from all angles and apply theoretical understandings from RAT and Cyber-RAT to actual cyberattacks.<\/p>\n\n\n\n<p><strong>Data and Analysis<\/strong><\/p>\n\n\n\n<p>Reports of cyber events in the healthcare sector comprise the data I examined for the study, emphasising aspects like methods of attack, organisational weaknesses, and security procedures. The authors also look at the conduct of offenders, especially why they choose to target healthcare systems.According to this report, healthcare institutions are easy targets since they frequently have outdated structures. In addition, cybercriminals are driven to persist in their attacks due to the high value of healthcare data on the dark web.<\/p>\n\n\n\n<p><strong>Relation to Class Concepts<\/strong><\/p>\n\n\n\n<p>&nbsp;This article closely relates to a number of issues covered in class, such as digital criminology and the function of social institutions in protecting data. I also think The use of RAT and Cyber-RAT is related to discussions about how advances in technology are upending established criminological notions. The paper&#8217;s focus on risk concerns in healthcare reflects class discussions on the importance of improved cybersecurity methods in important industries and the growing complexity of digital risk management.&nbsp;<\/p>\n\n\n\n<p><strong>&nbsp;Marginalised Groups<\/strong><\/p>\n\n\n\n<p>The article highlights marginalised individuals; in particular, it discusses how underprivileged populations are particularly impacted by cyberattacks on healthcare institutions. These populations are more vulnerable to system breaches and frequently have poorer access to healthcare. Sensitive data breaches may additionally exacerbate&nbsp; public confidence in healthcare providers.<\/p>\n\n\n\n<p><strong>Societal Contributions<\/strong><\/p>\n\n\n\n<p>This study shows the critical need for enhanced cybersecurity measures in the healthcare industry, which has a huge positive impact on society. The growing number and complexity of cyber-attacks make it important to comprehend the objectives of cybercriminals and the weaknesses in healthcare systems. The insights revealed by this research can inspire changes in legislation and increase security standards, eventually protecting patient data and ensuring the integrity of healthcare services.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>&nbsp;In conclusion, my paper explores cyber victimisation in the healthcare industry using Cyber-Routine Activities Theory (Cyber-RAT) and Routine Activities Theory (RAT) in an effective manner. Through an analysis of the variables that drive cyberattacks and make healthcare companies easy targets, the study provides insightful information about the relationship between crime, technology, and social institutions. The results underscore the necessity of improving cybersecurity protocols to safeguard susceptible populations and maintain confidence in healthcare organizations.<br><br><\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Yashna Praveen, Kim, M., &amp; Choi, K.-S. (2024). <em>Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)<\/em>. Virtual Commons &#8211; Bridgewater State University.<a href=\"https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/2\/\"> https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/2\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1: Cyber Victimisation in the Healthcare Industry Jahmir brown&nbsp; Cybersecurity and the Social Sciences (CYSE 201S) Diwakar Yalpi October 2 Article Review #1: Cyber Victimisation in the Healthcare Industry Introduction &nbsp;&nbsp;&nbsp;&nbsp;Analysing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)&#8221; explores the increasing vulnerability of the healthcare&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmirbrown\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":29547,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/users\/29547"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/309\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/309\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/media?parent=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}