Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

1.
National Training Standard for Information Systems Security (INFOSEC) Professionals, NSTISSI,
1994
.
2.
T.
Sahama
,
L.
Simpson
and
B.
Lane
, “
Security and Privacy in eHealth: Is it possible?
,”
IEEE 15th Jnternational Conference on e-Health Networking, Applications & Services (Healthcom)
, pp.
249
253
,
2013
.
3.
D.
Liveri
,
A.
Sarri
and
C.
Skouloudi
, “Security and Resilience in eHealth: Security Challenges and Risks,”
European Union Agency For Network And Information Security
,
Heraklion, Greece
,
2015
.
4.
L.
Rostad
and
Ø
Nytrø
, “
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges
,” in
The Second Jnternational Conference on Availability, Reliability and Security
,
2007
.
5.
E.
AbuKhousa
,
N.
Mohamed
and
J.
Al-Jaroodi
, “
e-Health Cloud: Opportunities and Challenges
,”
Future internet
,
2012
.
6.
Health care and cyber security: Increasing Threats Require Increased Capabilities
,”
KMPG
,
2015
.
7.
R.
Gajanayake
,
R.
Iannella
and
T.
Sahama
, “
Privacy Oriented Access Control for Electronic Health Records
,” in
Data Usage Management on the Web Workshop at the Worldwide Web Conference, ACM
,
Lyon
,
2012
.
8.
L.
Rostad
,
Access Control in Healthcare Information Systems
, PhD Thesis,
Trondheim
:
Norwegian University of Science and Technology
,
2009
.
9.
L.
Ibraimi
,
M.
Asim
and
M.
Petko
, “
Secure Management of Personal Health Records by Applying Attribute-Based Encryption
,” in
6th JnternationalWorkshop onWearable Micro and Nano Technologies for Personalized Health (pHealth)
,
2009
.
10.
M.
Li
,
S.
Yu
,
K.
Ren
and
W.
Lou
, “
Securing Personal Health Records in Cloud Computing: Client-Centric and Fine-Grained Data Access Control in Multi-owner Settings
,” in
SecureComm 2010
,
Heidelberg
,
Springer
,
2010
, pp.
89
106
.
11.
M.
Li
,
S.
Yu
and
Y.
Zheng
, “
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
,”
IEEE Transactions on Parallel and Distributed Systems
, vol.
24
, no.
1
, pp.
131
143
,
2013
.
12.
S.
Narayan
,
M.
Gagne
and
R.
Safavi-Naini
, “Privacy preserving ehr system using attribute-based infrastructure,” in
ACM workshop on Cloud computing security workshop
,
New York
,
2010
.
13.
A.
Lounis
,
A.
Hadjidj
,
A.
Bouabdallah
and
Y.
Challal
, “
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management
,” in
Eighth Jnternational Conference on Broadband and Wireless Computing, Communication and Applications
,
2013
.
14.
L.
Peterson
and
B.
Davie
,
Computer Networks: A Systems Approach
, 5th edition,
Burlington
:
Elsevier
,
2012
.
15.
J.
Winnefeld
,
C.
Kirchhoff
and
D.
Upton
, “
Cybersecurity’s Human Factor: Lessons from the Pentagon
,”
Harvard Business Review
,
2015
.
16.
P.
Williams
, “
When trust defies common security sense
,”
Health Jnformatics Journal
,
2008
.
17.
J.
Rajamaki
and
J.
Knuuttila
, “
Cyber Security and Trust: Tools for Multi-agency Cooperation between Public Authorities
,” in
Proc. of The 7th Jnternational Conference on Knowledge Management and Jnformation Sharing - KMJS
,
Lisbon
,
2015
.
18.
I.
Linkov
,
T.
Bridges
,
F.
Creutzig
,
J.
Decker
,
C.
Fox-Lent
,
W.
Kroger
,
J. H.
Lambert
,
A.
Levermann
,
B.
Montreuil
,
J.
Nathwani
,
R.
Nyer
,
O.
Renn
,
B.
Scharte
,
A.
Scheffler
,
M.
Schreurs
and
T.
Thiel-Clemen
, “
Changing the resilience paradigm
,”
Nature Climat Change
, vol.
4
, pp.
407
409
,
2014
.
19.
J.
Rajamaki
, “
Towards design theory for resilient (sociotechnical, cyber-physical, software-iontensive and systems of) systems
,” in
10th Jnternational Conference on Computer Engineering and Applications (CEA ’16)
,
Barcelona
,
2016
.
20.
A.
Hevner
and
S.
Chatterjee
,
Design Science Research in Information Systems
,
Springer
,
2010
.
21.
Disaster resilience: a national imperative
,
National Academy of Sciences
,
2012
.
22.
J.
Rajamaki
, “
Towards a design theory for resilient (sociotehnical, cyber-physical, software ans systems of) sytems
,” in
10th Jnternational Conference on Computer Engineering and Applications (CEA ’16)
,
Barcelona
,
2016
.
23.
J.
Rajamaki
and
R.
Pirinen
, “
Critical infrastructure protection: Towards a design theory for resilient software-intensive syst
,”
European Jntelligence and Security Jnformatics Conference (EJSJC)
,
2015
.
24.
R.
Pirinen
and
J.
Rajamaki
, “
Mechanism of Critical and Resilient Digital Services for Design Theory
,” in
The 2nd Jnternational Conference on Computer Science, Computer Engineering & Social Media, IEEE
,
Lodz, Poland
,
2015
.
25.
D.
Alberts
,
Information age transformation, getting to a 21st century military.
DOD Command and Control Research Program,
2002
.
26.
I.
Linkov
,
D.
Eisenberg
,
K.
Plourde
,
T.
Seager
,
J.
Allen
and
A.
Kott
, “
Resilience metrics for cyber systems
,”
Environ Syst Decis
,
2013
.
27.
T.
Abdelzaher
and
A.
Kott
, Resiliency and Robustness of Complex Systems and Networks.
Adaptive, Dynamic and Resilient Systems
,
Florida
:
Auerbach Publications
,
2013
.
This content is only available via PDF.