{"id":234,"date":"2025-04-25T17:49:21","date_gmt":"2025-04-25T17:49:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdent006\/?page_id=234"},"modified":"2025-04-25T17:49:21","modified_gmt":"2025-04-25T17:49:21","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdent006\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\" style=\"text-align: center\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Article Review #2 \u2013 Cyber Victimization in the Healthcare Industry: Analyzing Offender<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Motivations and Target Characteristics through Routine Activities Theory (RAT) and<\/span><\/strong><\/div>\n<div class=\"textLayer\" style=\"text-align: center\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyber-Routine Activities Theory (Cyber-RAT)<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: right\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Kaedon Denton<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">03-27-2025<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: left\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Introduction and Understanding the Threat<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: left\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Technology today stands as a backbone of not only our society in how we may gather and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">take in information or interact with each other, but it is more importantly entwined with our<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">workforce now more than ever. There are multiple fields of work in today\u2019s age that rely on<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technology and the systems they provide; this technology and their systems are strengthened by<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">their cybersecurity professionals enlisted to make sure that their systems cannot be compromised<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">or if they are it is minimal with a plan to recover. Everyday a company or an individual with an<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">online presence, especially those that handle digital data have a chance of being a victim of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybercrime, but this is significantly more prevalent in the healthcare industry. While the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">technological innovations in healthcare have improved the quality and accessibility of patient<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">care, it does pose a big threat for them to become a cybercrime victim. Since It Is not just<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">personal information that can be stolen but as well as the billing system that is used being<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">disrupted, as seen in a cyberattack that occurred in February 2024, the cyberattack targeted one<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">of the largest U.S. billing and payment system which not only disrupted the processing of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">millions of patients but also delayed them access to essential medications and care (Praveen,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Kim, &amp; Choi, 2024). These attacks that take place on the Healthcare system are some of the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most consequential threats to the industry, while these attacks do not just greatly affect the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">billing systems in place, they can also affect staff not being able to access critical data, as well as<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">with all the personal information that is held in their systems, a compromised system can have<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">patient data stolen and or lost. As these cyber threats become more common and sophisticated,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the healthcare industry is still behind in their infrastructure in developing plans to protect,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">respond to, and recover from cyberattacks (Praveen, Kim, &amp; Choi, 2024). This article proposes<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">using three specialized frameworks (Digital Capable Guardianship Framework, Online Lifestyle<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Awareness Framework, and Policy Framework) based on Routine Activity Theory (RAT) as<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">preventive measures to be implemented into healthcare systems and to analyze cyber<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">victimization in healthcare.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: left\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Research Findings<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: left\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The research done and recorded in this article set to address two research questions: (1)<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What are the primary motivations driving Advanced Persistent Threats to target the healthcare <\/span>industry? (2) What are the common characteristics and behaviors of APT groups that target<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\" style=\"text-align: left\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">healthcare institutions (Praveen, Kim, &amp; Choi, 2024)? The type of analysis that was used to<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">examine the association between the motivation behind cyberattacks on the healthcare sector,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">whether the attacks are state-sponsored, and the attack methods used. Starting with the attack<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">methods used there was a varied array of different attack methods, with malicious software<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">deployment being the most prevalent in Critical Care and Patient Services (83.0%), followed by<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Unauthorized Access and Control (75.9%) and Deception methods such as phishing (70.0%).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What was found as the most significant association between the cyberattacks on healthcare<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems, was financial gain as the most predominant motive across all the segments especially in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Critical Care and Patient Services (80.1%). There was as well Intellectual Property\/Patient data<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">theft, but it was more prominent in High-value Data and Innovation Targets (37.5%) (Praveen,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Kim, &amp; Choi, 2024). Lastly when state sponsored attacks were examined the analysis showed a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">non-significant association between state sponsorship and the targeted healthcare system<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Praveen, Kim, &amp; Choi, 2024). But what was identified as state sponsored attacks they were<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most prevalent in Critical Care and Patient Services and in High-Value Date and Innovative<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Targets, the origin of these cyberattacks did show a significant association with Russia being the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">most frequent country of origin.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Routine Activity Theory<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The Routine Activity theory states that crime will likely occur when three key elements<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are present those elements being, motivated offenders, suitable targets, and the absence of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">capable guardians. Starting the first element \u201cMotivated Offenders\u201d they are what is posing a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">threat to the healthcare industry, since they posses the intent and capabilities to engage in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybercrime. Second is \u201cSuitable Targets\u201d and in regards to how it is applied here is by<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cCybersecurity Vulnerabilities\u201d and with so much of healthcare being digitized it is a target for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cyber attacks due to the amount of personal identifiable information that is held. Lastly there is<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cAbsence of Capable Guardians\u201d which in this article does address not being able to directly see<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">these institutions cyber security policy set in place, they instead opted to give another statement<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">which is having proper education, simulation, and collaboration to help the workers identify and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mitigate future cyberthreats (Praveen, Kim, &amp; Choi, 2024).<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><\/strong><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To conclude this article was able to layout their proposition of what should be done for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">healthcare institutions systems going forward, providing in-depth data of their findings. As well<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">as not only providing data from what was captured from their analysis but also being able to take<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that information gathered and apply RAT to it to help in justification of implementing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">frameworks based off of RAT and making it Cyber-RAT. The contributions that this article can<\/span><\/div>\n<\/div>\n<div class=\"PageAnnotations\">provide is that of mass amount of data that was collected and the analyzed to help push for<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\" style=\"text-align: left\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">healthcare systems to be strengthened at large, so that in the case of a cyberattack on their<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems a healthcare institution does not have to shut out appointments or delay in helping<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">someone who might need urgent care. If frameworks like these were implemented it would not<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">only benefit the institutions but also society for the long term.<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<div class=\"textLayer\" style=\"text-align: center\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">References<\/span><\/strong><\/div>\n<div class=\"textLayer\" style=\"text-align: left\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Praveen, Y. , Kim, M. &amp; Choi, K. (2024). Cyber Victimization in the Healthcare<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Industry: Analyzing Offender Motivations and Target Characteristics through<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">RAT) .<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">International Journal of Cybersecurity Intelligence &amp; Cybercrime, 7(2)<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, &#8211; .<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">DOI: https:\/\/doi.org\/10.52306\/2578-3289.1186<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Available at: https:\/\/vc.bridgew.edu\/ijcic\/vol7\/iss2\/2<\/span><\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\n<div class=\"annotationLayer\" data-main-rotation=\"0\"><\/div>\n<\/div>\n<div class=\"PageAnnotations\"><\/div>\n<\/div>\n<\/div>\n<div>\n<div><\/div>\n<div class=\"Page-comment-line-top-margin\"><\/div>\n<div class=\"PageContainerComments\">\n<div>\n<div class=\"CommentContainerOffset\"><\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<div class=\"ScreenreaderAnnotations screenreader-only\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #2 \u2013 Cyber Victimization in the Healthcare Industry: Analyzing OffenderMotivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT) Kaedon Denton03-27-2025 Introduction and Understanding the Threat Technology today stands as a backbone of not only our society in how we may gather andtake in information or interact with each&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdent006\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30384,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/234"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/users\/30384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/234\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/234\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/media?parent=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}