Review
Abstract
Background: The vulnerability of health care systems to cyberattacks and breaches of health information is on the rise worldwide. Considering the increasing rate of reported cyber incidents and the risks they pose to patient safety, privacy, and financial losses, there is a need to examine the way cybersecurity is conceptualized in health care organizations, taking into account technology, processes, and humans.
Objective: This study examined the dynamics of the factors of vulnerabilities and cyberattacks in the context of sociotechnical systems theory underlying the relationships among humans, technology, and processes. It developed a conceptual sociotechnical cybersecurity framework for preventing vulnerabilities and responding to cyberattacks and threats in health care systems.
Methods: A scoping review was conducted to search the extant literature in 3 databases—Web of Science, PubMed (MEDLINE), and Scopus. A total of 1375 papers from the period of 2012-2024 were retrieved, 76 of which, in the domain of health care and cybersecurity, were reviewed and analyzed. Original research and review papers were included. Only published English-language papers were included to focus on contemporary issues, challenges, and solutions. Relevant information from the included sources was charted and summarized. The study characteristics were extracted from the included papers, and the evidence was synthesized using thematic analysis.
Results: Of the 1375 papers identified, 76 (5.5%) met the inclusion criteria. The results showed that the factors of vulnerabilities to cyberattacks comprise 12 subfactors in health care systems. Concerning technology-related factors of vulnerabilities, most studies described the complex system design and usability (16/76, 21%) and integration of new technology (15/76, 20%) as challenges in health care systems. Concerning human-related factors, most studies described a shortage of skilled professionals and limited budgets as contributing to poor cybersecurity management. The study found that processes involved both technology and humans relative to the unit factors of vulnerabilities to cyberattacks. There was a sociotechnical interplay across the factors of vulnerabilities. The concept of sociotechnical cybersecurity offers a comprehensive and explicit perspective on the sociotechnical underpinning and joint optimization required to advance cybersecurity toward achieving sustainable health care systems.
Conclusions: The conceptual framework of sociotechnical cybersecurity provides a contemporary foundation and deep insight for identifying and preventing vulnerabilities and responding to cyberattacks in health care systems. The framework is important due to its suitability, applicability, and customizability for dynamic and complex health care systems. The study also provides compliance standards for applying the proposed conceptual framework to guide health care organizations in cybersecurity practices. The study of cybersecurity through the sociotechnical lens in the health care domain is limited. Further studies are needed on cybersecurity incident management. Health care organizations should leverage the strength of cybersecurity through the implementation of risk assessment and incident response plans.
doi:10.2196/75584
Keywords
Introduction
Background
The digitalization of the health care system has introduced numerous positive effects and gains, such as easy access to health information and effective and efficient health care delivery processes and outcomes []. In the last 2 decades, health care digitalization has emerged as a topic of discussion among stakeholders in securing critical infrastructure. Understanding how health care professionals use digital technologies to provide high-quality care requires a stakeholder’s viewpoint.
Technology integration is the implementation of electronic health records (EHRs), integration of Internet of Medical Things (IoMTs) devices, and broader IT infrastructure. The rapid integration of these technologies into health care systems created this pathway of improved access to medical services, enhanced patient outcomes, and streamlined workflows for health care providers and services in a borderless, continuous health care journey for transitional nations. Patient health care diagnostics reports and information can be accessed in real-time to enable managing medical history and response to emergency cases with the use of EHR systems. However, this has introduced significant vulnerabilities, making health care systems more susceptible to cyberattacks that could compromise sensitive patient data and disrupt health care services [-]. As these vulnerabilities are linked to their areas of occurrence, they can be categorized and described through the interplay of technology, humans, and processes. This enables the application of sociotechnical systems (STS) theory and knowledge management approaches to health care systems [,]. The National Institute of Standards and Technology (NIST) Cybersecurity Framework acknowledges that these vulnerabilities may arise from human factors, technology, and organizational processes []. Additionally, the research by Kaberuka and Johnson [] on adapting the STAMP (Systems Theoretic Accident Model and Processes) for sociotechnical cybersecurity challenges in emerging nations acknowledges that human factors, organizational processes, and technology are of great concern. These vulnerabilities must be addressed for organizations to maintain resilience to cyberattacks and threats. NIST interagency and internal reports define these vulnerabilities as weaknesses in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source [,].
The relationships among technology, humans, and organizational processes lead to vulnerabilities exploited by cybercriminals or state-sponsored attackers to gain access and control over critical health care infrastructure and sensitive data, thereby disrupting health services. These vulnerabilities can be considered a sociotechnical problem in a complex health care system [,-]. This problem can be solved using a sociotechnical approach to tackling vulnerabilities in health care systems. According to the 2024 report of the World Economic Forum, the cost of damage incurred by all forms of cybercrime resulting from humans, technology, and organizational processes could reach US $10.5 trillion in 2025. Some of the main sociotechnical cybersecurity problems in health care systems include the following. First, in 2021, ransomware attacks were launched on the health care systems of Ireland, known as the Health Service Executive, disrupting the health care services of 54 public hospitals, and IT systems nationwide were shut down. As a result, more than 80% of the IT environment was encrypted by cybercriminals, and information was exposed at a great financial cost [,]. Second, the WannaCry ransomware attacks in 2017 infected over 200,000 computers worldwide and disrupted services due to vulnerabilities in computer operating systems [-]. Third, in 2017, Hollywood Presbyterian Medical Center was also attacked by ransomware that encrypted all health information. The medical center paid a ransom of US $17,000 to regain access to its data []. Fourth, in 2016, Lukaskrankenhaus, a public hospital in Germany, was attacked by ransomware initiated through phishing. Computer systems were forced by authorities to shut down [].
Based on this knowledge gap identified, the following research questions (RQs) were asked: (1) What are the sociotechnical factors of vulnerabilities to cyberattacks that affect health care systems? (RQ 1) (2) What kind of framework is best suited for preventing vulnerabilities and responding to cyberattacks and threats in health care systems? (RQ 2). The objective of this study was to examine the dynamics of the factors of vulnerabilities to cyberattacks from a sociotechnical perspective and develop a conceptual framework for preventing vulnerabilities and responding to cyberattacks and threats in health care systems.
Rationale and Sociotechnical Perspective
Rationale
The motivation for this research emerged following the increasing number of cyberattacks in health care organizations. Preventing cyberattacks requires an understanding of the multidimensional complexities of health care system factors of vulnerabilities. However, few studies have been conducted in the field of cybersecurity in health care from a sociotechnical perspective. Garcia-Perez et al [], Szczepaniuk and Szczepaniuk [], and Vukotich [] addressed cybersecurity challenges in health care systems from a technical perspective. Zimmermann and Renaud [] and Nicho and McDermott [] focused on addressing vulnerabilities in health care organizations using a social approach. This contributes to the literature by addressing the scholarly call for a sociotechnical cybersecurity framework in health care aimed at preventing vulnerabilities and responding to cyberattacks and threats [-]. Nicho and McDermott [], Wani et al [], and Sutton and Tompson [] noted that a comprehensive cybersecurity framework that closes the sociotechnical gap within health care organizations’ cyberspace is important. A study conducted by Malatji et al [] found that “only four security frameworks, namely NIST, ISO/IEC, COBIT, and IT-CMF partially fulfilled the security requirements of the social dimension of a sociotechnical system” [].
Scholars have contributed to cybersecurity theory by developing various generic frameworks for different types of organizations [,-]. This study proposed a conceptual sociotechnical cybersecurity framework for health care organizations to prevent vulnerabilities and respond to cyberattacks.
STSs Perspective
The STS theory examines the introduction of new technologies in organizations, their impact on humans, and the interactions between individuals of different skill sets, all within organized units to optimize the performance of social and technical systems [,]. According to Trist [], an STS perspective in any organization comprises a set of integrated and interacting social and technical subsystems or constructs, such as people, infrastructure, technology, culture, goals, and processes. At their core, STSs conceptualize the design and performance of any organizational system that can only be optimized if there is an integration and interplay of the social and technical aspects, and they are deemed interdependent parts of a complex system.
The term STSs originated with Emery and Tris in 1960, as they observed that systems involve complex interactions among people, machines, and the environmental aspects of the organizational system []. The concept of STS theory was proposed by the Tavistock Institute as a method used to treat wounded soldiers and in constructions by Mumford [], Emery [], and Trist []. The underlying assumption of STSs advocates that systems design should be a process that considers both social and technical aspects that influence the functionality and usage of interconnected computer-based systems [].
This study adopted an STS perspective on cybersecurity in the domain of health care that integrates technology, humans, and processes, subsystems, or constructs. In the context of cybersecurity in health care, the aforementioned constructs were established in the study conducted by Zimmermann and Renaud []. illustrates the 3 areas of STSs that were integrated in a holistic approach to prevent vulnerabilities and respond to cyberattacks in health care systems through an intervention framework [,,].

Methods
Protocol and Registration
The review was performed based on the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews) checklist by the JBI (Joanna Briggs Institute) [,]. This study aimed to examine the dynamics of the factors of vulnerabilities to cyberattacks and propose a conceptual framework for health care systems. During the planning stage of this scoping review, a protocol was created that reflected sources of information, search strategies, inclusion and exclusion criteria, source selection, and data charting processes. This scoping review protocol was not registered. The PRISMA-ScR checklist is presented in .
Information Sources
Three scientific databases—Web of Science, PubMed (MEDLINE), and Scopus—were searched to retrieve relevant papers, including both original research and review papers.
Search
Search queries were customized to the syntax and indexing features of each database. Keyword searches targeted the key concepts of cyberattacks and health care for PubMed, Scopus, and Web of Science. The title and additional abstract search terms were used to identify relevant publications. Truncation was used to identify word variations of the key concepts in different publications. The search terms were separated with the Boolean operators “AND” and “OR.”
PubMed (MEDLINE) incorporated a combination of Medical Subject Headings, including computer security, health care facilities, workforce, services, and delivery of health care. An example of the search strategy in one of the databases is shown in . The detailed search strategy used for the other databases is provided in .
“Computer Security”[Mesh] OR Cyberattack*[tw] OR Cybercrime*[tw] OR “Cyber Crime”[tw] OR Cyberthreat*[tw] OR “Cyber Threat”[tw] OR “Cyber Crises”[tw] OR “Cyber Risk”[tw] OR “Cyber Incident”[tw] OR Cyber Operation[tw] OR Cyberspace[tw] OR “Cyber Infrastructure”[tw] OR “Data Breach”[tw] OR “Data Security”[tw] OR “Firewall”[tw] OR “Information Security”[tw] OR “Information Technology Security”[tw] OR “Information Systems Security”[tw] OR “Security Incident”[tw] OR “Network Security”[tw] OR Ransomware[tw] OR Malware[tw] OR Phishing[tw] ) AND ( “Health Care Facilities, Workforce, and Services”[Mesh] OR “Delivery of Health Care, Integrated”[Mesh] OR “Health Care”[tw] OR “Health Information”[tw] OR “Health Information Management”[tw] OR “Healthcare Systems”[tw] OR “Health Systems”[tw] OR “Health System Infrastructure”[tw] OR “Medical Devices”[tw] OR Medical Technolog*[tw] OR Health Technolog*[tw] OR Health Care Technolog*[tw].
Eligibility Criteria
The inclusion criteria for the papers were relevance to health care cybersecurity, coverage of cybersecurity issues, challenges, and solutions in health care systems. Only English-language papers published between 2012 and 2024 were included ().
| Criterion | Inclusion | Exclusion |
| Language of papers | Papers in English | Non–English-language papers |
| Year of publication | Papers published between 2012 and 2024 | Papers published outside the range of 2012-2024 |
| Research topic focus | Cybersecurity and health care | The topic is different from the topic areas |
| Scope of work | Key elements and factors that contribute to or lead to breaches, cyberthreats, cyberattacks, and vulnerabilities, and the development of a sociotechnical intervention framework for health care system resilience | Topics outside the research scope of work |
| Publication type | Original research and review papers | Research in-progress papers, editorial papers, and theses |
Selection of Sources of Evidence
The retrieved papers were exported to the citation tool Zotero (Digital Scholar), in which duplicates were identified and removed using the duplicate item function. To assess eligibility, the titles and abstracts of each paper were analyzed by 2 of the authors. In instances in which the eligibility criteria for the papers were not clear, all 3 authors checked the papers and perused them to assess their relevance.
Data Charting Process
Using a standard Microsoft Excel (Microsoft Corp) spreadsheet, data from the studies that met the eligibility criteria were extracted independently by one of the authors and assessed by the other 2 authors to ensure data quality and consistency. This was used to identify the key characteristics of each study and relevant information regarding cyberattacks in health care.
Data Items
The key data items extracted included author, year of publication, country of origin, study design, aims, and key findings. The extracted data items were checked by the second author. A list of the extracted characteristics for the included studies (N=76) is provided in [,,,,,,,-,-,-,-].
Critical Appraisal Within Sources of Evidence
The quality of the source of evidence was checked by 2 authors using 3 different appraisal tools. Joanna Briggs Critical Appraisal Tools were used for qualitative research [], the Mixed Methods Appraisal Tool [] was used for mixed methods studies, and the Centre for Evidence-Based Medicine Critical Appraisal Checklist was used for cross-sectional studies [] and the Scale for the Assessment of Narrative Review Articles Appraisal Tool for narrative review papers []. This was carried out to ensure that the sources of evidence were up-to-date, relevant, and reputable. For instances in which this was not clear, all 3 authors assessed the sources ( [,,,,,,,-,-,-,-,]). However, the JBI Manual for Evidence Synthesis suggests that critical appraisal is not required for scoping review [,]. elucidates the different quality appraisal methods in detail. Studies were not excluded based on quality to capture as much literature as possible; however, low-quality studies were not used to draw conclusions.
Synthesis of Results
Thematic analysis was conducted manually following the 6-step approach described by Braun and Clarke []. The 6-step approach involves familiarization with data, generating initial code by using sticky notes, searching for themes, reviewing the themes, defining and naming the themes, and producing the report. The analysis is hybrid in nature. The results were presented for the data extracted from the relevant papers in tabular form and descriptive formats (categorized into themes), which aligned with the objective and scope of the review.
Results
Overview
A total of 1375 papers were identified from the databases. Thereafter, 377 duplicate papers were removed, and 998 were screened. Subsequently, 213 full-text papers underwent screening. In the end, 76 papers were included in the review ( illustrates the selection process).
The review of the extant literature confirmed the 3 factors of vulnerabilities to cyberattacks (technology, humans, and processes) from the lens of the STS theory in health care systems; they are presented in -4. These factors were further categorized into twelve subfactors: (1) new technology integration, (2) complex system design and usability, (3) third-party application and plugin, (4) limited monitoring, (5) inadequate access control management, (6) insider threats, (7) shortage of skilled professionals and limited budget, (8) inefficient training, (9) security culture, (10) untimely incidence response and recovery plan, (11) inadequate policy and procedure, and (12) lack of regular audit and assessment. Subsequently, these 12 subfactors were outlined in descriptive formats.

| Technology | Studies, n (%) | References | |||
| New technology integration | 15 (20) | ||||
| New technology integration into health care systems creates a new landscape for health care systems to be vulnerable to cyberattacks and threats. | [,,,-] | ||||
| Inappropriate technology integration creates loopholes and interoperability and compatibility challenges that lead to cyberattacks and threats. | [,,] | ||||
| Interconnected medical and end point devices, when exposed to the internet, create security risks that are possible points of access for cyberattackers to gain access to health care systems. | [,,,,] | ||||
| Complex system design and usability | 16 (21) | ||||
| Complex system design tends not to be user-friendly; thus, its application in health care systems creates ambiguity in managing cloud-based big data and information, which results in exploitation by cybercriminals. | [,,,] | ||||
| Design limitations on implanted medical sensor devices, such as assembly size and limited energy source, lead to connectivity and communication interruption for health care professionals in monitoring patients and data due to denial-of-service attacks. Such limitations also create encryption challenges. | [,] | ||||
| Lack of a comprehensive or holistic framework for the security design in all layers of connected medical devices and software applications creates health information and privacy risks for internet-based device architecture and the operational environment. | [,,,] | ||||
| Highly complex interconnected network systems increase the likelihood of vulnerabilities. | [,,,,,] | ||||
| Third-party applications and plugins | 7 (9) | ||||
| Software internet-based products from third-party applications leverage vulnerabilities in medical devices and authentication errors that can be exploited by hackers to steal sensitive data or manipulate health care system operations. | [,] | ||||
| Most incidents of vulnerability and cyberattacks in health care systems stem from a wide range of sources, such as operating systems or cloud-based software architectures of third-party developers. | [-] | ||||
| Third-party universal applications and devices, such as mobile apps and hardware integration in health care systems used for telemedicine applications, are not able to provide user anonymity when confronted with cyberattacks. | [,] | ||||
| Health care plugin apps for mobile devices often face privacy and security issues due to developer deviation from compliance with regulatory standards. | [,] | ||||
| Limited monitoring | 11 (15) | ||||
| Inadequate capabilities for continuous monitoring of systems result in health information breaches and cyberattacks in health care systems. | [,,,,] | ||||
| Inconsistent monitoring affects compliance, health care cyber-critical infrastructure updates, and organizational processes. This invariably constrains organizations’ preparedness to achieve the goals of security standards. | [,,,] | ||||
| Complexities in monitoring processes in health care organizations are a gateway to data breaches, cyber threats, and cyberattacks. | [,] | ||||
| Inadequate access control management | 8 (11) | ||||
| Reactive health care systems that lack a strong access control system are prone to privilege escalation attacks. | [,,,] | ||||
| In the course of a malware incident, attackers can modify access control systems to grant administrative privileges to exploit health care systems. | [,,] | ||||
| Breakdown in access control management resulting from an update, server disruption, or malicious intrusion pushes health care organizations to shut down operational processes in the event of a cyberattack to reduce harm. | [,,] | ||||
| Humans | Studies, n (%) | References | |||
| Insider threats | 7 (9) | ||||
| Insiders can introduce threats and vulnerabilities through inadvertent actions, such as inappropriate behavior, clicking phishing links, and falling victim to cyber threats. | [,,] | ||||
| Most of the breaches that occur in health care organizations originate with insiders stealing and leaking sensitive information to cybercriminals for money or political gain. | [,,,] | ||||
| Negligence by internal IT teams in failing to terminate vendor accounts or agreements in intersupport systems of care could create an entry point for vulnerability to cyberattacks. | [,] | ||||
| Inefficient training | 9 (12) | ||||
| Health care cybersecurity training implementations are largely misdirected, with a focus on cybersecurity professionals and information and communication technology (ICT) departments only, while neglecting health care–based professionals. | [,,] | ||||
| Ineffective cybersecurity training helps cybercriminals gain access to a health care system’s sensitive information through social engineering methods such as phishing, malware, and baiting. | [,,,,] | ||||
| Training that lacks blended skill development is ineffective in achieving a sustainable goal to mitigate cyber exploitation and ensure personal development for health care professionals. | [,,] | ||||
| Shortage of skilled professionals and limited budget | 15 (20) | ||||
| Another reason for increasing cyber breaches of sensitive health information is the limited budget allocation for cybersecurity. | [,,,,,-] | ||||
| Health care organizations endure poor security management in containing attacks and cybercrime, and developing new strategies to counteract cyber threats and breaches due to a shortage of skilled professionals and limited budget. | [,,,] | ||||
| The shortage of cybersecurity experts in health care organizations creates a vacuum for attacks and breaches, while also hindering the development of cybersecurity knowledge among employees. | [,,,] | ||||
| Security culture | 11 (15) | ||||
| Lack of security culture awareness among health care organization staff, coupled with inadequate training in behavior, interactions, and meaningful work practices within the work environment, constitutes a significant factor that may facilitate improper data handling practices and protection. | [-,,] | ||||
| Novel viral infections and pandemics requiring rapid technological advancement in health care diagnostics invariably affect behavioral patterns at work and the daily cybersecurity activities of employees. | [,] | ||||
| Poor management of organizational culture may affect employees’ cybersecurity behaviors and attitudes toward technology use, thereby increasing the risk of cyberattacks. | [,-] | ||||
| Processes | Studies, n (%) | Reference | |||
| Untimely incident response and recovery plan | 12 (16) | ||||
| Ineffective operational communication systems create poor incident response and preparedness to respond to threats and cyberattacks. | [,,-] | ||||
| Containing an attack and a breach in a health care system through postincident response takes approximately 100 days or more before a health information system is restored to normal, safe mode. | [] | ||||
| Cybersecurity strategies in health care systems are often reactive instead of proactive in cyber defense mechanisms, backup, and recovery. | [,,,] | ||||
| There is limited research on cybersecurity response strategies, which is a great concern. | [-] | ||||
| Inadequate policies and procedures | 11 (15) | ||||
| Standard policy protocol for most health care organizations is inadequate to meet best practice measures in cybersecurity. | [,,-] | ||||
| Some policies and procedures set out by regulatory bodies are cumbersome in laying down information security expectations and are complex to follow. For example, breaches below 500 are neglected and not taken into account. | [,] | ||||
| Policies in line with secure behavioral awareness are inadequate for safeguarding health care systems from cyber breaches. | [,,,] | ||||
| Lack of regular audits and assessments | 10 (13) | ||||
| Most health care organizations do not perform regular or consistent security audits and risk assessments as required by regulations and best practices to visualize security risk levels. | [,,,] | ||||
| Most health care organizations do not categorize their risks into external and internal risks or have an effective risk plan in place. | [,,] | ||||
| Conducting an assessment and audit of a complex sociotechnical system in cybersecurity fails to factor in technology, organizational environment, and humans as a whole. | [,,,,,] | ||||
Technology Factors
Integration of New Technology
Smart health care systems have successfully procured and integrated medical cyber-physical systems technologies with the Internet of Things to facilitate operations using virtual networks, applications, and devices, as well as to monitor diagnoses, manage treatment, and manage administrative processes in the delivery of health care services []. This new technology integration has helped to streamline health care for effective service delivery. The integration of these digital technologies has evolved as they create complex interconnected ecosystems, making it challenging to implement and maintain robust security measures across all components [,,,,,].
Inappropriate technology integration increases the vulnerability of health care organizations to cyberattacks and breaches when the complex STSs integration process and standards are not properly followed or managed [,,]. Additionally, it poses a risk when data is exchanged between the cloud and electronic records, or when it travels within the health care delivery ecosystem. Some of the reasons for the risk are unsupported integration, inappropriate standard implementation [,], lack of secure development in the ideation stage [], ineffective communication, and interoperability issues. These issues, in turn, can give cybercriminals unauthorized access to health information or data because of such vulnerabilities in technology []. Furthermore, it is necessary for health care system actors to know that the integration of medical devices and interconnectivity does not equate to interoperability; likewise, interoperability does not equate to the security of medical devices and data protection.
Complex System Design and Usability
Complex design and usability can lead to security vulnerabilities in health care information systems [,] by affecting data processing, confidentiality, availability, integrity, and design limitations. It creates friction for staff, which can lead to unhealthy security practices in monitoring the IoMT devices and compromising patient safety and privacy [,,]. Additionally, complex and poor system design can make it easier for hackers to exploit vulnerabilities in medical devices and systems, resulting in cyber incidents such as phishing attacks or other social engineering tactics to trick users into giving up their login credentials or downloading and executing malicious software [,]. This can harm patients in an emergency and slow care delivery, which can be linked to biomedical nonmaleficence principles []. In managing complex health IT challenges, adopting a user-centered approach to health care service operations is pivotal for preventing vulnerabilities and cyberattacks in health care systems [].
Complex designs and user interfaces of health care devices and applications make it difficult to secure the valuable information in health care systems. Poor design and usability can lead to human user errors, such as accidentally exposing sensitive patient information or mistakenly changing critical medical settings or configurations. The emerging usability literature has highlighted these sociotechnical shortcomings, which could lead to threats and medical errors in health care systems []. User satisfaction—whether for patients or health care professionals—at every stage of task performance is enhanced by a friendly design process that prioritizes usability [,], design, and data processing. This, in turn, facilitates the effective and efficient delivery of health care services.
Third-Party Applications and Plugins
The adoption of third-party applications and plugin software in modern-day smart health care systems can be used in many more ways than traditional standalone software in health care delivery. Third-party application software, in the form of software as a service, has evolved to make use of web-based, intelligent chatbots and large language models. The complexity of these technologies makes it difficult to control their service dynamics as they become vulnerable to cyberattacks [,,,]. In some cases, the vulnerability of cyber-critical systems that expose health information and patient privacy is not only an issue of the medical device, but also a software malfunction that could put organizations at risk and affect the quality of services [,,].
Hackers can embed malicious software, such as ransomware, in application software or operating systems. Such malicious software can execute and replicate viruses in health care systems by acting like a legitimate third-party software program. It can then create a backdoor to gain access to sensitive information and organization files for launching cryptolocker attacks [,]. Additionally, cybercriminals use third-party software and application plugins to impersonate health care service providers, all the while having malicious motives as part of organized syndicates illegally collecting health data. Some medical applications hosted on mobile systems are illegitimate third-party apps, which are another source of privacy violations and data leakage [,,,].
Malware can easily be introduced to the medical network of systems when the IT team of the medical device software application makes an error during the development stage. It is estimated that 90% of incidents or breaches occur through exploiting vulnerabilities in a device system’s software application program []. The use of implanted devices always has issues of software malfunction and update-related problems []. For instance, a 2013 analysis of mobile medical health fitness apps showed that over 40% of paid medical applications were completely lacking privacy policies, and 40% of the applications stored sensitive patient information, such as financial details, biodata, and addresses []. While only 50% of mobile apps encrypt the personal identifying information sent over the internet, 80% of these third-party applications store this personal identifying information on a local device without encryption, which is liable to be accessed []. Having control over third-party software applications and systems while also focusing on developing software from the same device manufacturer will help curb the risk of data breaches and protect sensitive health care–related information [].
Researchers seem to relate cyber issues to medical devices, neglecting the fact that without operating systems and application software, medical devices would not execute other clinical functions and administrative services in delivering health care [,,]. Regularly updating system software is necessary to improve security against new threats and viruses, since over 90% of breaches stem from programmable software applications or boot systems kernel development, which can be used for implanting viruses in computer systems.
Limited Monitoring
Limited monitoring of the health care systems’ critical infrastructure increases the risk of delayed detection of threats and vulnerabilities, allowing them to propagate in the system and cause even greater damage [,,]. Perimeter monitoring technology, such as antivirus and firewalls, also called detection technology, has been developed to recognize known variants of viruses and other threats. In the era of fast-paced technology advancement, ransomware coders are also advancing with detection technology by reprogramming malicious code so that it can remain undetected by the monitoring scanner []. Despite the advancement of technology, many health care organizations are still using traditional security monitoring procedures to protect sensitive information and health care systems. Continuous monitoring of health care systems in both real-time and offline modes is essential to enable detection and mitigation of threats [,,].
Inadequate Access Control Management
New technology in health care systems requires role-based access control management for professionals and organizations in managing sensitive resources and operations. Many health care organizations become victims of health information breaches or cyberattacks due to inadequate access control management across different technology platforms and applications. This creates a weak access point for cybersecurity operational integration, which results in system flaws, compatibility issues, and interoperability challenges that facilitate access for cybercriminals to gain entry into the health care system network. Strong access control policies help foster effective access control and identity management [,,]. Managing employee privileges and training them not to share passkeys can help prevent lapses in access authorization while ensuring role-based access control to strengthen identity and access management in health care systems [].
Health care organizations must ensure that their network has strong control systems and structures for better identity management to avoid unauthorized access, breaches of sensitive information, and identity theft [,,]. Weak cybersecurity control and identity management could stem from software applications, human factors, and organizational management processes as a result of outdated systems and technology [,-].
Human Factors
Insider Threats
Insider threats have recently been seen as a growing challenge. Research has attributed these specific threats to the emergence of connected health care IT, which is one of the causes of data breaches or leakages of protected health information [,]. However, insider threats are linked to the human element of health care IT systems, wherein human error has been seen as one of the major sources of vulnerabilities in the critical cyber infrastructure [,,]. The root causes of insider threats include insecure behavior by employees and organizations’ inadequate investment in employees’ cybersecurity skills for social and technical know-how [,,]. In contrast, during the era of nontechnical application of care delivery, insider threats were less visible to organizations when protected health information was filed through paper-based manual storage systems. The traditional breaches from insider threats were physical breaches, such as the theft of patients’ valuable information, theft of files and computers, or missing paper health care records [,,,]. The missing data or breach in patient information was known only to the health care organizations, so the collection of new health records from patients would begin without the need to notify patients about General Data Protection Regulation or Health Insurance Portability and Accountability Act violations [].
Research has also revealed that since the emergence of the interconnectivity of records, the level of insider threats and attacks has increased tremendously, as such interconnectivity provides multiple gateways for access in a remote location and setting [,,]. Furthermore, the level of insider threats in this era of digital health processes will be more accountable with proper cybersecurity systems and monitoring compared to the paper-based process, where the insider goes unnoticed and underreported. Research has also revealed that, between 2019 and 2024, organizations reported that insider threats increased from 66% to 74% []. The literature has also revealed that insiders, rather than outsiders, contributed to about 70% of data fraud and breaches in an organization []. This is also attributed to a lack of employee cybersecurity ethics, management implementation of data integrity, and privacy of patient records as a culture of ethics in the workplace []. Authors have highlighted different issues of insider threats, digging deep into the risks and issues of insider threats and breaches in health care organizations [].
Inefficient Training
Inefficient training of employees can have a significant negative impact on health care systems, most importantly when a health care professional lacks the knowledge and understanding of cybersecurity vulnerabilities and threat patterns of the health care system [,]. It is the duty of health care organizations to give proper training and awareness of cyber threats and attacks to their staff [,]; otherwise, employees may easily become vulnerable, resulting in data breaches of sensitive health information []. It is important to conduct training assessments for employees; otherwise, it will be difficult to ascertain the extent of the training required []. Phishing training, including gamification-based methods, is one approach to assessing employee knowledge. Training results can then be used to design a curriculum that is tailored to work processes, ensuring that employees acquire the training needed to enhance IT security awareness and readiness [,]. It is important that health care professionals who use critical hospital infrastructure are trained in comprehensive cybersecurity user applications, including sociotechnical techniques for dealing with health care cybersecurity vulnerabilities, threats, and risks [,].
Shortage of Skilled Professionals and Limited Budget
Cybersecurity breaches in health care increase daily due to a growing shortage of skilled professionals and limited budgets, posing a significant concern [,,]. This concern is critical for health care organizations due to the large amounts of valuable sensitive data stored in the EHR system and cloud. This sensitive data includes medical records, insurance information, and financial data [].
Many health care institutions lack the cybersecurity expertise required to defend their digital health care systems from cyberattacks [,]. However, while the demand for cybersecurity experts in health care is high, the supply is low. As a result, health care organizations may be subjected to complex assaults on critical infrastructure requiring specific knowledge [,]. For instance, cybercriminals take advantage of employees’ low skill sets to exploit them []. This shortage of skills continues to leave health care organizations challenged in the changing environment of health care systems, which constrains the organizations from detecting and preventing cyberattacks in health care systems []. Furthermore, limited investment in cybersecurity systems and technology accelerates vulnerabilities, threats, and attacks in health care organizations [,,] due to obsolete techniques that lag behind digital trust and security protection. In some cases, health care businesses have limited cybersecurity budgets, making it difficult to invest in the required technologies and resources for defending themselves against threat actors and vulnerabilities [,,]. The shortage of skilled professionals and limited budgets can lead to major cybersecurity vulnerabilities in the health care system [,].
Security Culture
Security culture plays a crucial role in addressing cyber threats in health care organizations. To properly protect information assets, information security behavior is essential []. The norms, values, and attitudes of health care professionals contribute to the development and maintenance of a robust security culture in health care organizations that actively support security initiatives []. Thus, employees’ behavior with regard to data privacy is important for the effectiveness of cybersecurity in the workplace environment []. Insecure behavior has been identified as one of the most significant factors contributing to vulnerabilities in cybersecurity []. Its 4 key components are lack of awareness and experience, unauthorized workflows, behavior prioritization, and environmental appropriateness [,].
In this digital health care era, the social influence of peers is a critical driver that influences health care professionals’ motives regarding data privacy policy and security. Furthermore, attitude plays a mediating role in employees’ motives regarding compliance with data privacy and policy []. Digitalization in health care organizations can be influenced by attitudes toward cybersecurity, subjective norms, and perception of control over security measures []. Insecure behaviors and attitudes of employees and patients regarding the use of technology increase vulnerabilities to cyberattacks.
Process Factors
Untimely Incident Response and Recovery Plan
Untimely incident responses and recovery plans in the event of health information breaches and cyberattacks in health care systems undermine public, stakeholder, and patient trust that health care organizations or hospitals can manage their sensitive health information [,,]. A planned or coordinated response and recovery strategy determines the health care systems’ ability to contain breaches or threats [,]. Effective response and recovery plans can mitigate the severity of cyberattacks in health care systems, reducing their impact and preventing future occurrences [,]. Despite this, many health care organizations ignore incident response and recovery plans as part of their cybersecurity strategy and measures for protecting health care systems [,].
The WannaCry cyberattack incident against the UK’s National Health Service metamorphosed to infect larger systems of health care. This was due to the negligence and poor response strategies associated with the attack []. Although the National Health Service management was informed of the vulnerability of the Windows operating system, the IT team was slow to respond to updating the legacy system [,]. To mitigate both visualized and hidden cyberattacks in health care systems, the cybersecurity IT team must establish an effective response strategy that integrates evolving technological advancements with new approaches to advanced persistent threats [,].
In some cases in which health care organizations were attacked with ransomware, the organizations lost all health care data when they refused to pay a ransom to a cybercriminal. This was due to the lack of a contingency plan, backup, and recovery systems [,,]. Health care organizations are expected to have backup and recovery plans that enable failover of health care data in the event of a cyberattack [,] to avoid disruption of services [].
Inadequate Policies and Procedures
Many health care organizations still operate under traditional information security policies and procedures despite technological advancements and the increase in health care breaches and cyberattacks. Traditional information security policies and old-order operational procedures have become obsolete as technology has evolved []. Security policies and operational procedures form the foundation for health care systems’ defense against cyber threats and vulnerabilities because they dictate how sensitive health information is protected, incidents are handled, and employees are trained on cybersecurity programs to ensure best practices [,,]. Inadequate policies and procedures predispose health care systems to the risk of cyberattacks and threats []. Inadequate policies can stem from several factors, such as underestimation of cyber threats, lack of awareness to engage with cybersecurity issues, and underinvestment []. For example, Health Insurance Portability and Accountability Act regulations state that cybersecurity breaches affecting fewer than 500 people should not be reported or fined, which can create ambiguity and gaps in enforcement [,]. Additionally, this may encourage organizations with fewer than 500 patients to neglect the security and privacy of this group of patients. Such organizations might endure breaches without disclosing them to the necessary data protection and regulatory authority. The 2015 Anthem breach is a case study of one of the largest breaches, in which the personal information of over 78 million individuals was exposed as a result of inadequate encryption, weak access control policies, and human error [].
As technology develops, some health care organizations fail to implement new policies that align with evolving technology and the compliance standards necessary to protect health care systems and ensure resilience in managing health information and the entire ecosystem [,,,,].
Lack of Regular Audit and Assessment
Existing research has shown that many health care organizations conduct security audits and assessments once a year. Health care organizations that do not engage in regular and comprehensive cybersecurity audits and risk assessments often fail to identify cyberthreats and vulnerabilities in health care systems [,]. Furthermore, in the absence of regular security audits and assessments health care organizations may struggle to detect vulnerabilities, making it easier for cybercriminals to exploit the weaknesses in their systems []. For instance, the cause of the SolarWinds supply chain attack, in which the back door was created by a cybercriminal without detection, is a case in which sensitive information was harvested for more than a year before being detected only after the cybercriminals exposed the information in the public domain. A regular audit ensures the proper monitoring and evaluation of employee behaviors and security practices []. Additionally, with these measures, health care organizations can easily detect vulnerabilities and risk levels of third-party applications through comprehensive and regular audits of the health care systems [,,].
Health care organizations that do not conduct monthly and quarterly audits and assessments will significantly increase their cybersecurity risk profile, which may lead to the possibility of continual breaches [,].
Taxonomy Factors of Vulnerabilities to Cyberattacks
indicates the taxonomy-related factors of vulnerabilities to cyberattacks, unit-related factors of vulnerabilities to cyberattacks, types of cyberattacks, and their effects on health care organizations.
| Factors of vulnerabilities to cyberattacks | Unit factors of vulnerabilities to cyberattacks | Types of cyberattacks | Effect on the health care organization | Reference | |||||
| Technology | |||||||||
| New technology integration | EHRsa, medical and network devices, and software | Ransomware, cryptojacking, and DOSb | Health information breaches, legal fines from regulators, operational disruptions, data loss, and reputation damage | [,,,,,,] | |||||
| Complex system design and usability | EHRs, medical and network devices, and software | Ransomware and DOS | Operation disruptions, cyber breaches, loss of trust, legal fines from regulators, financial loss, and reputation damage | [,,,] | |||||
| Third-party application and plugin | EHRs, medical and network devices, and software | Phishing, DOS, and ransomware | Cyber breaches, health care security weakness, operational disruption, compromised safety, and data loss | [,,,] | |||||
| Limited monitoring | EHRs, medical and network devices, and applications | DOS, worm infection, ransomware, and data exfiltration | Patient safety risk, service disruption, data breaches, data loss, compromise of Confidentiality, Integrity, and Availability, and operational handicap | [] | |||||
| Inadequate access control management | EHRs, medical and network devices, and applications | Ransomware, DOS, privilege escalation attack, and phishing | Patient safety risk, data breaches, identity theft, manipulation of data, and possible ransom payments | [,,,,] | |||||
| Humans | |||||||||
| Insider threats | Health care professionals and EHRs | Identity theft, espionage, and sabotage | Service disruption, loss of trust, sale of data, sensitive data breaches, and data loss | [,,,,,] | |||||
| Inefficient training | Health care professionals | Phishing, worm infection, and ransomware | Financial loss, fine imposition, huge cost implication, data loss, incorrect diagnosis, and error treatment | [,,,] | |||||
| Shortage of skilled professionals and limited budget | Health care professionals | Ransomware, viruses, phishing, and DOS | Patient safety risk, decreased secure care quality, inadequate compliance, insecure health care services, budget reallocation, and data breaches | [,,,,,] | |||||
| Security culture | Health care professionals | Ransomware, virus, phishing, DOS, DDOSc | Insecure behavior, reputation damage, loss of trust, identity theft, security negligence, data breaches, and poor service delivery | [,,,,] | |||||
| Processes | |||||||||
| Poor incident response and recovery plan | Health information, medical devices, applications, health care professionals, and patients | Ransomware, crypto jacking, DNSd spoofing, and DOS | Health information breaches, identity theft, legal suits, health care service disruption, ransom payments, loss of data, hard-to-recover data, and financial loss | [,,,,] | |||||
| Inadequate policy and procedure | Health information, medical devices, applications, health care professionals, and patients | Ransomware, worm infection, phishing, and DOS | Service disruption, possible patient harm, compromised sensitive data, regulatory fines, violation of privacy, financial loss, poor security strategies, and data breaches | [,,,,] | |||||
| Lack of regular audit and assessment | Health information, medical devices, applications, health care professionals, and patients | Man-in-the-middle attack, crypto jacking, and worm infection | Reputation damage, possible patient harm, service disruption, privacy violation, unauthorized access freedom, breaches of sensitive information, and data loss | [,] | |||||
aEHR: electronic health record.
bDOS: denial of service.
cDDOS: distributed denial of service.
dDNS: domain name system.
Discussion
Summary of the Findings
This study examined the dynamics of the factors of vulnerability to cyberattacks in the 3 core areas of the STSs theory of technology, humans, and processes in health care systems through a scoping review of 76 papers.
This study found that the integration of new technology can be challenging in protecting health care systems from cyberattacks in the absence of an appropriate intervention. The findings also showed that complexities in system design present adaptability challenges for health care professionals; thus, cyberspace is prone to a high-risk incidence of threats. Furthermore, third-party software limits security in smart health care, which has various impacts on health organizations.
The findings revealed that internal threats existing in health care systems are not linked only to health care professionals but also to IT teams. Additionally, inefficient cybersecurity training exposes health care organizations to vulnerabilities and cyberattacks. The findings also showed that inadequate investment in human capital and limited finances contribute to poor cybersecurity management. This study further found that the decline in security culture is based on cultural deviation and radical technological change in health care organizations, which is deeply rooted in the behaviors and attitudes of employees.
The present study found that most health care organizations are unprepared and do not have a proactive incident response and recovery plan in place in the event of a cyberattack []. The communication gap, untimely postincident response, cybersecurity strategies, and limited research on cybersecurity responses contribute immensely to cyber threats and cyberattacks. Furthermore, limitations in continuous monitoring include inadequate capabilities, inconsistent monitoring, and complex monitoring processes that increase cyber insecurity in health care organizations. The findings also indicate that cybersecurity policies and procedures can be complex and inadequate in shaping the security of health care cyberspace. Additionally, cybersecurity auditing and assessment can be inconsistent, fail to classify risks as internal or external, and include nonholistic perspectives of the STS. The study further found that weak access control management and breakdowns facilitate the exploitation of sensitive data in health care systems.
The findings showed that despite the similar unit factors of vulnerabilities to cyberattacks for the subfactor of technology and the occurrence of various types of cyberattacks, the effect on health care organizations remains the same. Additionally, despite the similar unit factors of vulnerabilities to cyberattacks for the subfactor of humans, the types of cyberattacks that occurred differed to some extent; however, the effect on health care organizations was somewhat varied. Furthermore, despite the similar unit factors of vulnerabilities to cyberattacks for the subfactors of processes, the types of cyberattacks that occurred were similar to a great extent; consequently, the effects on health care organizations were also similar to a great extent. In general, this study found that processes involve both technology and humans relative to the unit factors of vulnerabilities to cyberattacks. This confirms the sociotechnical interplay among the factors of vulnerabilities in health care systems [].
Sociotechnical Cybersecurity Framework
Overview
The three core constructs of STSs that can protect health care systems from vulnerabilities to cyberattacks and breaches are technology, humans, and processes [,]. In the context of this study, the three constructs of STSs are referred to as the factors of vulnerabilities, which are the areas in which vulnerabilities occur.
This study proposed a conceptual sociotechnical cybersecurity framework for health care systems that entails the factors of vulnerabilities, IT team, cyberattackers, and cybersecurity knowledge management and intelligence response (CKMIR). The framework incorporates features such as intrusion detection and response, user behavior monitoring, threat intelligence, vulnerability scanning, alert sensors, cloud-based repositories, and recovery mechanisms as a comprehensive approach in responding to the vulnerabilities, cyberattacks, and threats in health care systems; this framework is presented in .
The components of the sociotechnical cybersecurity framework are explained in the following sections.

Factors of Vulnerabilities
The factors of vulnerabilities involve humans, technology, and processes, which are interwoven in the sociotechnical cybersecurity framework [,,].
IT Team
The IT team is one of the human elements in the loop that provides technical support, maintenance, and remediation for the health care system. The IT team includes software engineers, system developers, cybersecurity experts, compliance officers, IT support staff, and network engineers. They are responsible for the day-to-day health of IT operations to ensure smooth and secure health care service delivery.
Health Care Professionals
Health care professionals include doctors, nurses, administrative staff, etc. The doctors consult with the patients online and onsite, access their medical history from the cloud through the EHR system, and prescribe medication, while the nurses monitor patients’ health, provide care, and access patients’ medical information through the medical network. Health care administrative staff are responsible for administrative and clinical tasks, such as scheduling staff and appointments for patients to ensure the practice runs smoothly.
Cyberattackers
The cyberattacker is a cybercriminal who exploits the health care system using sophisticated techniques to launch attacks on health care–critical infrastructure. They launch attacks through denial of service, ransomware, and identity theft of patient health information. The stolen information is sold on the dark web for financial gain.
About CKMIR
The CKMIR intrusion detection feature systematically analyzes network traffic, human behavior, technology, and processes in real time to optimally detect and isolate known and unknown cyber threats and attacks in health care systems to enable remediation.
The CKMIR user behavior monitoring feature identifies and analyzes the patterns of human behavior and interactions within health care systems, such as login times, access patterns, file transfers, and application usage, as well as internal and external threats, to determine unauthorized access and compromised accounts.
The CKMIR threat intelligence feature collects, analyzes, and interprets raw data on the intent, opportunity, and capability of malicious actors and shares structured information with the IT team through actionable intelligence.
The CKMIR vulnerability scanning feature scans, detects, identifies, and classifies technology, human, and process factors of vulnerabilities in health care systems and provides countermeasures for cyber threats.
The CKMIR alert sensor senses isolated cyber threats and attacks and sends alerts to the IT team in real time.
The CKMIR cloud repository and recovery feature store and back up encrypted data, critical system files, and security event records to recover data in the event of a cyberattack.
Drivers
The drivers are the factors that determine the transition of cybersecurity in health care organizations. They play critical roles in shaping sustainable cybersecurity in health care systems. These drivers include policy, leadership, communications and transparency, cultural sensitivity, and collaborators.
In this conceptual framework, CKMIR plays a significant role in automated defense regarding vulnerabilities and intelligent response in the event of a cyber threat or attack.
The framework provides a contemporary foundation and pathway for identifying and preventing vulnerabilities and responding to cyberattacks and threats in health care systems. This conceptual framework is important for identifying, capturing, organizing, storing, and sharing real-time data and actionable intelligence and preventing vulnerabilities to cyberattacks in health care systems. The conceptual framework functions holistically from a sociotechnical perspective of cybersecurity in health care systems. The proposed framework plays a critical role in system interplay for detecting, classifying, and preventing vulnerabilities and providing real-time incident response and automated report generation to ensure that the IT team is informed of the current security status, ongoing incidents, and actions taken.
In , an up-down bidirectional arrow indicates the relationship between CKMIR and health care systems. This up-down bidirectional relationship shows that CKMIR prevents vulnerabilities, provides real-time incident response, stores data, and remediates it in the event of threat intrusion and cyberattack, while the health care systems transmit data to CKMIR. Furthermore, opposing 2-way arrows show a relationship between CKMIR and the IT team. This 2-way relationship indicates that CKMIR transmits automated reports while the IT team accesses CKMIR to perform maintenance, remediation, and decision-making. In essence, this framework offers a comprehensive and well-defined approach to the sociotechnical underpinning and joint optimization of cybersecurity’s progress in achieving sustainable health care systems. The visual model of the proposed CKMIR system is shown in .

Practical Implementation Steps for the Conceptual Framework
The practical implementation steps for the validation of the proposed conceptual sociotechnical cybersecurity framework are shown in . The implementation steps involve the classification of the vulnerability’s areas of occurrence (technology, humans, and processes), defining goals, mapping stakeholders, orientation, risk assessment, validation, and feedback. The guide indicates an interplay within the vulnerability’s areas of occurrence (technology, humans, and processes). It also shows that there is a joint optimization between the vulnerabilities’ areas of occurrence and the CKMIR system to identify and prevent vulnerabilities and respond to cyberattacks. The implementation of the proposed sociotechnical cybersecurity framework for health care systems (hospitals) in a real-world scenario is aimed at achieving optimal cybersecurity resilience.
Linking the CKMIR System to the NIST Model
The CKMIR elements align with the core functions of the NIST model in . The core functions of the NIST model involve identifying, protecting, detecting, responding, and recovering []. The CKMIR elements involve intrusion detection, vulnerability scanning, user behavior monitoring, alert sensors, threat intelligence, and cloud repository and recovery.
The unique value proposition of the CKMIR model is the configuration, dynamic integration, and its mode of operation, such as real-time incident response optimization. Specifically, its unique value proposition is the provision of threat intelligence, human behavior analytics, and cross-component integration in the health care system. The CKMIR model applies to the health care system in its capacity to solve complex health care problems in the vulnerable areas of occurrence emanating from IoMT devices, cloud, EHRs, health care professionals, and patients. The model-specific sociotechnical contributions encompass the optimal identification and mitigation of vulnerabilities arising from technology, humans, and processes.

Compliance Standards for Applying the Proposed Framework
Compliance standards are necessary for the application of the conceptual sociotechnical cybersecurity framework to guide health care organizations in their cybersecurity practices. It will also facilitate the process of cybersecurity risk assessment for health care professionals. The compliance standard is detailed in [,,,,,,,,, ,-,,,,,,,,].
Practical Implications
Considering the increase in cyberattacks, breaches, and overdependence on modern technology for health care diagnosis and treatment, it is important for health care organizations and stakeholders to examine how technology can be implemented. In particular, policies should mandate secure development for technology integration and third-party applications through adoption and control measures within health care system audit assessments and compliance procurement plans. Health care organizations should leverage the strength of cybersecurity through the implementation of risk assessment and incident response plans that complement current and emerging threats and cyberattacks. Health care organizations should adopt compliance standards for applying the sociotechnical framework as a guide to maintaining cybersecurity hygiene in health care systems (). Health care institutions should ensure that the implementation of a medical device security lifecycle is integrated into Confidentiality, Integrity, and Availability practices as quality control measures []. Health care organizations should implement network segregation of sensitive areas for greater protection, easy usability, and secure workarounds. Additionally, regular network assessment is required to monitor traffic and network behavior, and to trigger alerts regarding abnormalities []. The design of network systems should be simplified and while training professionals to develop secure health care systems. Further, health care management should recruit more skilled professionals, offer training to employees, and increase budgeting for cybersecurity to ensure the delivery of uninterrupted health care services. Health care organizations must implement strong access control systems and policies that ensure the use of strong password systems, multifactor authentication, and strong privileges that grant access to health care critical infrastructure only to authorized employees.
The adoption of the sociotechnical cybersecurity framework by health care organizations will accelerate and optimize cybersecurity progression and support IT teams and operational processes in sustaining the health care cyber space.
Comparison With the Previous Literature
The findings of the scoping review are in line with the existing evidence that obsolete infrastructure, limited budget, complex policies and procedures, ineffective training, and a shortage of cybersecurity experts are barriers to cybersecurity in health care systems [,,]. Additionally, Al-Qarni [] affirms our findings that health care organizations must have an evolving policy that aligns with emerging technological trends and cyber threats, along with a continuous upgrade and backup plan.
Various schools of thought advocate addressing cybersecurity vulnerabilities in health care systems through a sociotechnical approach, rather than relying solely on technical or social perspectives. Invariably, studies support holistic and joint optimization approaches [,,,].
The concept of applying a sociotechnical perspective to cybersecurity in the health care domain has received little attention over the years, and the notion of a sociotechnical perspective on cybersecurity in health care is still evolving. Nevertheless, for cybersecurity in health care, a myriad of perspectives, such as a social perspective [], a cybersecurity perspective [,], a sociotechnical perspective [], the NIST perspective [], an organizational perspective [], and a knowledge management perspective [] have been applied. In this study, cybersecurity challenges and issues were addressed in health care organizations from an outstanding approach of the sociotechnical viewpoint by developing the sociotechnical cybersecurity framework; this is a novel instance of the theoretical contributions ().
In the quest for solutions, scholars have developed various frameworks that contribute to the theory of cybersecurity in health care. Rehman et al [] proposed a framework for a secure health monitoring system in health care 5.0 and used blockchain technology and an intrusion detection system to detect any malicious activity in health care networks. Wazid et al [] proposed a framework for generalized secure healthcare 5.0 to provide solutions for the challenges in health care systems. Furthermore, Jalali et al [] proposed the Eight Aggregated Response Strategies (EARSs) framework for cybersecurity incidents. In this context, the CKMIR model differs from the secure health monitoring model [] in the configuration of its elements. Further, the CKMIR model differs from the secure healthcare 5.0 model [] in its capability to respond to numerous simultaneous cyberattacks. Additionally, our proposed model optimized cybersecurity response capabilities compared to the EARS model []. The incident reporting and vulnerability analysis are automated and embedded within our model, unlike in the EARS model. Generally, the CKMIR model differs from existing models in its components’ compatibility, design, and joint optimization of the technology, humans, and processes in preventing vulnerabilities and responding to cyberattacks.
This study contributes to existing cybersecurity theory in several ways, taking an entirely different approach. One way is through the thematic classification of technology, human, and process-related factors of vulnerabilities to cyberattacks in health care systems in their descriptive format (-). It highlights the 3 constructs of sociotechnical-related factors of vulnerabilities to cyberattacks relative to their subfactors in health care systems. The second contribution is an in-depth analytical synthesis of the taxonomy factors of vulnerabilities to cyberattacks. It highlights such factors relative to their subfactors in health care systems (). The main contribution is the development of the conceptual sociotechnical cybersecurity framework for health care systems (). The framework identifies and prevents vulnerabilities and responds to threats and cyberattacks. The proposed framework provides the foundation for understanding the connection and integration of the factors of vulnerabilities (technology, humans, and processes) to cyberattacks and threats from a sociotechnical perspective in health care systems. It presents a comprehensive approach that is important for fostering and supporting the current understanding of cybersecurity from a sociotechnical lens in health care systems.
Limitations
This study included only papers published in English. Gray literature was not examined. Reports, research-in-progress papers, editorial papers, and inaccessible papers were also excluded. Furthermore, papers outside the study’s context were excluded. Cybersecurity in health care papers from a sociotechnical perspective were rarely available.
Conclusions
The sociotechnical perspective of cybersecurity is a critical prerequisite and foundation for resolving vulnerabilities and preventing cyberattacks, breaches, and threats in a complex health care system. This study used a scoping review to examine the dynamics of the factors of vulnerabilities to cyberattacks and develop the sociotechnical cybersecurity framework for preventing vulnerabilities and responding to threats and cyberattacks in health care systems. Furthermore, this study also presents the compliance standards for the application of the conceptual framework to guide health care organizations’ cybersecurity practices. This study examined the landscape of cybersecurity vulnerabilities and confirmed that an interplay exists among the 3 sociotechnical themes of technology, humans, and processes.
Despite the growing benefits of technology, this study observed that the increasing number of breaches and cyberattacks is linked to the unpreparedness of health care organizations, a lack of compliance, communication issues, irregular adverse assessments, and a lack of timely response to cybersecurity incidents and proper monitoring. It should be noted that online and offline backup and recovery plans are important for mitigating incidents. Health care organizations that embed a culture of inclusiveness and training with the necessary skills can eliminate insider threats and cyberattacks in health care systems. To address the vulnerabilities related to complexities in system design, health care organizations must ensure that priority is given to cybersecurity and user-centered designs for processes and the technological integration, application, and implementation of critical health care infrastructure as a sociotechnical approach [,]. This includes implementing security design and multifactor authentication instructions, secure text display, cryptographic instructions, tokenization, and alert triggers to providers and legitimate users to control system security operations. This implementation can affect usability and complex design from the patients’ and providers’ points of view to track intrusions, detect abnormalities, and prevent unlawful access to health information.
The proposed conceptual sociotechnical cybersecurity framework provides a comprehensive and explicit overview of the sociotechnical foundations of vulnerabilities (technology, human factors, and processes) in health care systems.
In spite of the existing generic cybersecurity frameworks from a sociotechnical perspective to tackle issues of vulnerabilities and cyberattacks in organizations, the framework is important for its suitability, applicability, and customization to a dynamic and complex health care system.
In addition to further research to empirically validate the proposed framework for accuracy, feasibility, and effectiveness in health care organizations, there is also a need to investigate the adoption of blockchain technology for accelerating incident response processes in health care systems.
Acknowledgments
The author is grateful to the Finnish Cultural Foundation for its support in funding this research.
Authors' Contributions
PE was responsible for this study’s design, quality appraisal, screening, data extraction, synthesis of results, and paper preparation. TV contributed by providing inputs and advice on protocols, data extraction, and eligibility criteria, as well as screening papers, abstracts, and full texts. Additionally, TV played a significant role in shaping this paper by offering critical feedback on the draft for continuous improvement. TM provided guidance, data collection, and comments on the revised paper.
Conflicts of Interest
None declared.
PRISMA-ScR checklist.
PDF File (Adobe PDF File), 101 KBDetailed search strategy.
DOCX File , 15 KBCharacteristics of the included studies.
DOCX File , 51 KBCritical appraisal.
DOCX File , 35 KBQuality appraisal grouped by study method.
DOCX File , 17 KBPractical implementation steps for the conceptual framework.
DOCX File , 165 KBThe compliance standards to guide the conceptual framework.
DOCX File , 19 KBReferences
- Kioskli K, Fotis T, Mouratidis H. The landscape of cybersecurity vulnerabilities and challenges in healthcare: security standards and paradigm shift recommendations. 2021. Presented at: ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security; August 17-20, 2021:1-9; Vienna, Austria. [CrossRef]
- Slayton R. Governing uncertainty or uncertain governance? Information security and the challenge of cutting ties. Sci, Tech, Hum Values. 2020;46(1):81-111. [CrossRef]
- Wurm J, Jin Y, Liu Y, Hu S, Heffner K, Rahman F, et al. Introduction to cyber-physical system security: a cross-layer perspective. IEEE Trans Multi-Scale Comput Syst. 2017;3(3):215-227. [CrossRef]
- Dias FM, Martens ML, Monken SFDP, Silva LFD, Santibanez-Gonzalez EDR. Risk management focusing on the best practices of data security systems for healthcare. Int J Innovation. 2021;9(1):45-78. [CrossRef]
- Wang S, Wang H. A sociotechnical systems analysis of knowledge management for cybersecurity. Int J Sociotechnol Knowl Dev. 2021;13(3):77-94. [CrossRef]
- Kaberuka J, Johnson C. Case studies in the socio-technical analysis of cybersecurity incidents: comparing attacks on the UK NHS and irish healthcare systems. 2022. Presented at: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media; June 20–21, 2022:357-387; Wales. [CrossRef]
- Kaberuka J, Johnson C. Adapting STPA-sec for socio-technical cyber security challenges in emerging nations: a case study in risk management for Rwandan health care. 2020. Presented at: International Conference on Cyber Security and Protection of Digital Services (Cyber Security); 2020 June 15-19; Dublin, Ireland. [CrossRef]
- Kissel R. Glossary of key information security terms glossary of key information security terms. The National Institute of Standards and Technology. 2013. URL: https://nvlpubs.nist.gov/nistpubs/ir/2013/nist.ir.7298r2.pdf [accessed 2025-09-13]
- Zhan Y, Ahmad SF, Irshad M, Al-Razgan M, Awwad EM, Ali YA, et al. Investigating the role of cybersecurity's perceived threats in the adoption of health information systems. Heliyon. 2024;10(1):e22947. [FREE Full text] [CrossRef] [Medline]
- Anastasopoulou K, Mari P, Magkanaraki A, Spanakis E, Merialdo M, Sakkalis V. Public and private healthcare organisations: a socio-technical model for identifying cybersecurity aspects. 2020. Presented at: ICEGOV '20: Proceedings of the 13th International Conference on Theory and Practice of Electronic Governance; September 23-25, 2020:168-175; Athens, Greece. [CrossRef]
- Offner KL, Sitnikova E, Joiner K, MacIntyre CR. Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Intell Natl Security. 2020;35(4):556-585. [CrossRef]
- Sittig D, Singh H. A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl Clin Inform. 2016;7(2):624-632. [FREE Full text] [CrossRef] [Medline]
- Abdi A, Bennouri H, Keane A. 2024. Presented at: 13th Mediterranean Conference on Embedded Computing (MECO); June 11-14, 2024:1-8; Budva, Montenegro. [CrossRef]
- Health sector cybersecurity: 2021 retrospective and 2022 look ahead. Health and Human Services. URL: https://www.hhs.gov/sites/default/files/2021-retrospective-and-2022-look-ahead-tlpwhite.pdf [accessed 2025-09-13]
- Lasky S. WannaCry ransomware worm attacks the world. SecurityInfoWatch.com. 2017. URL: https://www.securityinfowatch.com/cybersecurity/information-security/article/12334948/wannacry-ransomware-worm-attacks-the-world [accessed 2025-09-13]
- Coventry L, Branley D. Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas. 2018;113:48-52. [FREE Full text] [CrossRef] [Medline]
- Malatji M, Von Solms S, Marnewick A. Socio-technical systems cybersecurity framework. ICS. 2019;27(2):233-272. [CrossRef]
- Argaw ST, Bempong N, Eshaya-Chauvin B, Flahault A. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review. BMC Med Inform Decis Mak. 2019;19(1):10. [FREE Full text] [CrossRef] [Medline]
- Argaw ST, Troncoso-Pastoriza JR, Lacey D, Florin M, Calcavecchia F, Anderson D, et al. Cybersecurity of hospitals: discussing the challenges and working towards mitigating the risks. BMC Med Inform Decis Mak. 2020;20(1):146. [FREE Full text] [CrossRef] [Medline]
- Garcia-Perez A, Cegarra-Navarro JG, Sallos MP, Martinez-Caro E, Chinnaswamy A. Resilience in healthcare systems: cyber security and digital transformation. Technovation. 2023;121:102583. [CrossRef]
- Szczepaniuk H, Szczepaniuk EK. Cryptographic evidence-based cybersecurity for smart healthcare systems. Inf Sci. 2023;649:119633. [CrossRef]
- Vukotich G. Healthcare and cybersecurity: taking a zero trust approach. Health Serv Insights. 2023;16:11786329231187826. [FREE Full text] [CrossRef] [Medline]
- Zimmermann V, Renaud K. Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset. Int J Hum-Comput Stud. 2019;131:169-187. [CrossRef]
- Nicho M, McDermott C. Dimensions of ‘Socio’ vulnerabilities of advanced persistent threats. IEEE; 2019. Presented at: International Conference on Software, Telecommunications and Computer Networks (SoftCOM); September 19-21, 2019:1-5; Split, Croatia. [CrossRef]
- Malatji M, Marnewick A, von Solms S. Validation of a socio-technical management process for optimising cybersecurity practices. Comput Secur. 2020;95:101846. [CrossRef]
- Svandova K, Smutny Z. Internet of medical things security frameworks for risk assessment and management: a scoping review. J Multidiscip Healthc. 2024;17:2281-2301. [FREE Full text] [CrossRef] [Medline]
- Ewoh P, Vartiainen T. Vulnerability to cyberattacks and sociotechnical solutions for health care systems: systematic review. J Med Internet Res. 2024;26:e46904. [FREE Full text] [CrossRef] [Medline]
- Wani TA, Mendoza A, Gray K. A sociotechnical approach to bring-your-own-device security in hospitals: development and pilot testing of a maturity model using mixed methods action research. JMIR Hum Factors. 2025;12:e71912. [FREE Full text] [CrossRef] [Medline]
- Sutton A, Tompson L. Towards a cybersecurity culture-behaviour framework: a rapid evidence review. Comput Secur. 2025;148:104110. [CrossRef]
- Mozzaquatro BA, Agostinho C, Goncalves D, Martins J, Jardim-Goncalves R. An ontology-based cybersecurity framework for the internet of things. Sensors (Basel). 2018;18(9):3053. [FREE Full text] [CrossRef] [Medline]
- Mtsweni J, Gcaza N, Thaba M. A unified cybersecurity framework for complex environments. 2018. Presented at: SAICSIT '18: Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists; September 26-28, 2018:1-9; Port Elizabeth South Africa. [CrossRef]
- Davis MC, Challenger R, Jayewardene DN, Clegg CW. Advancing socio-technical systems thinking: a call for bravery. Appl Ergon. 2014;45(2, Part A):171-180. [FREE Full text] [CrossRef] [Medline]
- Trist EL. Towards A Social Ecology: Contextual Appreciation of the Future in the Present. London; New York. Plenum Press; 1973.
- Appelbaum SH. Socio‐technical systems theory: an intervention strategy for organizational development. Manage Decis. 1997;35(6):452-463. [CrossRef]
- Mumford E. The story of socio‐technical design: reflections on its successes, failures and potential. Inf Syst J. 2006;16(4):317-342. [CrossRef]
- Emery F. Sociotechnical foundations for a new social order? Hum Relat. 1982;35(12):1095-1122. [CrossRef]
- Trist E. The evolution of socio-technical systems. Conf Organ Des Perform. 1981. URL: https://sistemas-humano-computacionais.wdfiles.com/local--files/capitulo%3Aredes-socio-tecnicas/Evolution_of_socio_technical_systems.pdf [accessed 2025-09-28]
- Baxter G, Sommerville I. Socio-technical systems: from design methods to systems engineering. Interact Comput. 2011;23(1):4-17. [CrossRef]
- Arksey H, O'Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol. 2005;8(1):19-32. [CrossRef]
- Tricco AC, Lillie E, Zarin W, O'Brien KK, Colquhoun H, Levac D, et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): checklist and explanation. Ann Intern Med. 2018;169(7):467-473. [FREE Full text] [CrossRef] [Medline]
- Tully J, Selzer J, Phillips JP, O'Connor P, Dameff C. Healthcare challenges in the era of cybersecurity. Health Secur. 2020;18(3):228-231. [CrossRef] [Medline]
- Arafa A, Sheerah H, Alsalamah S. Emerging digital technologies in healthcare with a spotlight on cybersecurity: a narrative review. information. 2023;14(12):640. [CrossRef]
- He Y, Aliyu A, Evans M, Luo C. Health care cybersecurity challenges and solutions under the climate of COVID-19: scoping review. J Med Internet Res. 2021;23(4):e21747. [FREE Full text] [CrossRef] [Medline]
- Alhammad A, Yusof MM, Jambari DI. A review of cyber threats to medical devices integration with electronic medical records. 2022. Presented at: International Conference on Cyber Resilience (ICCR); October 06-07, 2022; Dubai, United Arab Emirates. [CrossRef]
- Kandasamy K, Srinivas S, Achuthan K, Rangan VP. Digital healthcare - cyberattacks in Asian organizations: an analysis of vulnerabilities, risks, NIST perspectives, and recommendations. IEEE Access. 2022;10:12345-12364. [CrossRef]
- Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care. 2017;25(1):1-10. [FREE Full text] [CrossRef] [Medline]
- Pool J, Akhlaghpour S, Fatehi F, Burton-Jones A. A systematic analysis of failures in protecting personal health data: a scoping review. Int J Inf Manage. 2024;74:102719. [CrossRef]
- Cartwright AJ. The elephant in the room: cybersecurity in healthcare. J Clin Monit Comput. 2023;37(5):1123-1132. [FREE Full text] [CrossRef] [Medline]
- Calyam P, Kejriwal M, Rao P, Cheng J, Wang W, Bai L. Towards a domain-agnostic knowledge graph-as-a-service infrastructure for active cyber defense with intelligent agents. 2023. Presented at: IEEE Applied Imagery Pattern Recognition Workshop (AIPR); September 27-29, 2023; St. Louis, MO. [CrossRef]
- Messinis S, Temenos N, Protonotarios NE, Rallis I, Kalogeras D, Doulamis N. Enhancing internet of medical things security with artificial intelligence: a comprehensive review. Comput Biol Med. 2024;170:108036. [FREE Full text] [CrossRef] [Medline]
- Lopatina K, Dokuchaev V, Maklachkova VV. Data risks identification in healthcare sensor networks. 2021. Presented at: International Conference on Engineering Management of Communication and Technology (EMCTECH); October 20-22, 2021; Vienna, Austria. [CrossRef]
- Filipec O, Plášil D. The cybersecurity of healthcare the case of the Benešov hospital hit by Ryuk ransomware, and lessons learned. OaS. 2021;21(1):27-52. [CrossRef]
- Wazid M, Das AK, Mohd N, Park Y. Healthcare 5.0 security framework: applications, issues and future research directions. IEEE Access. 2022;10:129429-129442. [CrossRef]
- Ogunniye G, Hana A, Watson J. PETRAS: a socio-technical framework for internet of things research and development. Front Internet Things. 2024;3:1336564. [FREE Full text] [CrossRef]
- Rehman A, Abbas S, Khan M, Ghazal T, Adnan K, Mosavi A. A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Comput Biol Med. 2022;150:106019. [CrossRef]
- Semancik J, Wells A. Techniques to maximize O-level cyber security protection. 2023. Presented at: IEEE AUTOTESTCON; August 28-31, 2023; National Harbor, MD. [CrossRef]
- Giansanti D. Cybersecurity and the digital-health: the challenge of this millennium. Healthcare (Basel). 2021;9(1):62. [FREE Full text] [CrossRef] [Medline]
- Lee I. Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: a content analytics research method. Comput Secur. 2023;129:103185. [CrossRef]
- Arora S, Yttri J, Nilse W. Privacy and security in mobile health (mHealth) research. Alcohol Res. 2014;36(1):143-152. [FREE Full text] [Medline]
- Wang Z, Huo Z, Shi W. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J Med Syst. 2015;39(1):158. [CrossRef] [Medline]
- Abraham C, Chatterjee D, Sims RR. Muddling through cybersecurity: insights from the U.S. healthcare industry. Bus Horiz. 2019;62(4):539-548. [CrossRef]
- Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps review for the non-cyber professional. Front Digit Health. 2022;4:862221. [FREE Full text] [CrossRef]
- Janith K, Iddagoda R, Gunawardena C, Sankalpa K, Abeywardena K, Yapa K. SentinelPlus: a cost-effective cyber security solution for healthcare organizations. In.; 2021. Presented at: ICAC 2021 - 3rd International Conference on Advancements in Computing, Proceedings; December 09-11, 2021:359-364; Colombo, Sri Lanka. [CrossRef]
- Dameff CJ, Selzer JA, Fisher J, Killeen JP, Tully JL. Clinical cybersecurity training through novel high-fidelity simulations. J Emerg Med. 2019;56(2):233-238. [CrossRef] [Medline]
- Feeley A, Lee M, Crowley M, Feeley I, Roopnarinesingh R, Geraghty S, et al. Under viral attack: an orthopaedic response to challenges faced by regional referral centres during a national cyber-attack. Surgeon. 2022;20(5):334-338. [CrossRef] [Medline]
- Beaman C, Barkworth A, Akande TD, Hakak S, Khan MK. Ransomware: recent advances, analysis, challenges and future research directions. Comput Secur. 2021;111:102490. [FREE Full text] [CrossRef] [Medline]
- Hijji M, Alam G. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. IEEE Access. 2021;9:7152-7169. [FREE Full text] [CrossRef] [Medline]
- Fernando J, Dawson L. The natural hospital environment: a socio-technical-material perspective. Int J Med Inform. 2014;83(2):140-158. [CrossRef] [Medline]
- Pranggono B, Arabo A. COVID-19 pandemic cybersecurity issues. Internet Technol Lett. 2021;4(2):e247. [CrossRef]
- Wilner AS, Luce H, Ouellet E, Williams O, Costa N. From public health to cyber hygiene: cybersecurity and Canada’s healthcare sector. Int J. 2022;76(4):522-543. [CrossRef]
- DeFord D. Sustainable digital health demands cybersecurity transformation. Front Health Serv Manage. 2022;38(3):31-38. [CrossRef] [Medline]
- Hines E, Trivedi S, Hoang-Tran C, Mocharnuk J, Pfaff M. Perspectives on cybersecurity and plastic surgery: a survey of plastic surgeons and scoping review of the literature. Aesthet Surg J. 2023;43(11):1376-1383. [CrossRef] [Medline]
- Gordon W, Wright A, Glynn R, Kadakia J, Mazzone C, Leinbach E, et al. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. J Am Med Inf Assoc. 2019;26(6):547-552. [FREE Full text] [CrossRef] [Medline]
- Ireland CA, Ireland JL, Jones NS, Chu S, Lewis M. Predicting security incidents in high secure male psychiatric care. Int J Law Psychiatry. 2019;64:40-52. [CrossRef] [Medline]
- Sekandi JN, Murray K, Berryman C, Davis-Olwell P, Hurst C, Kakaire R, et al. Ethical, legal, and sociocultural issues in the use of mobile technologies and call detail records data for public health in the East African region: scoping review. Interact J Med Res. 2022;11(1):e35062. [FREE Full text] [CrossRef] [Medline]
- Yeng PK, Szekeres A, Yang B, Snekkenes EA. Mapping the psychosocialcultural aspects of healthcare professionals' information security practices: systematic mapping study. JMIR Hum Factors. 2021;8(2):e17604. [FREE Full text] [CrossRef] [Medline]
- Alfawzan N, Christen M, Spitale G, Biller-Andorno N. Privacy, data sharing, and data security policies of women's mHealth apps: scoping review and content analysis. JMIR mHealth uHealth. 2022;10(5):e33735. [FREE Full text] [CrossRef] [Medline]
- Monteith S, Bauer M, Alda M, Geddes J, Whybrow PC, Glenn T. Increasing cybercrime since the pandemic: concerns for psychiatry. Curr Psychiatry Rep. 2021;23(4):18. [FREE Full text] [CrossRef] [Medline]
- Sari PK, Handayani PW, Hidayanto AN, Yazid S, Aji RF. Information security behavior in health information systems: a review of research trends and antecedent factors. Healthcare (Basel). 2022;10(12):2531. [FREE Full text] [CrossRef] [Medline]
- Coventry L, Branley-Bell D, Sillence E, Magalini S, Mari P, Magkanaraki A. Cyber-risk in healthcare: exploring facilitators and barriers to secure behavior. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2020. URL: https://scispace.com/pdf/cyber-risk-in-healthcare-exploring-facilitators-and-barriers-1kmegfd0ff.pdf [accessed 2025-09-28]
- Branley-Bell D, Coventry L, Sillence E, Magalini S, Mari P, Magkanaraki A, et al. Your hospital needs you: eliciting positive cybersecurity behaviours from healthcare staff. Ann Disaster Risk Sci. 2020;3(1). [CrossRef]
- Abbou B, Kessel B, Natan MB, Gabbay-Benziv R, Dahan Shriki D, Ophir A, et al. When all computers shut down: the clinical impact of a major cyber-attack on a general hospital. Front Digit Health. 2024;6:1321485. [FREE Full text] [CrossRef] [Medline]
- Harrison AS, Sullivan P, Kubli A, Wilson KM, Taylor A, DeGregorio N, et al. How to respond to a ransomware attack? One radiation oncology department's response to a cyber-attack on their record and verify system. Pract Radiat Oncol. 2022;12(2):170-174. [CrossRef] [Medline]
- Mohammed Z. Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches. OCJ. 2022;2(1):41-59. [CrossRef]
- Keogh RJ, Harvey H, Brady C, Hassett E, Costelloe SJ, O'Sullivan MJ, et al. Dealing with digital paralysis: surviving a cyberattack in a national cancer center. J Cancer Policy. 2024;39:100466. [CrossRef] [Medline]
- Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, et al. Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J Med Syst. 2020;44(5):98. [CrossRef] [Medline]
- He Y, Maglaras L, Aliyu A, Luo C. Healthcare security incident response strategy - a proactive incident response (IR) procedure. Secur Commun Networks. 2022;2022(1):2775249. [CrossRef]
- Jalali M, Russell B, Razak S, Gordon W. EARS to cyber incidents in health care. J Am Med Inf Assoc. 2019;26(1):81-90. [FREE Full text] [CrossRef] [Medline]
- Lohrke FT, Frownfelter-Lohrke C. Cybersecurity research from a management perspective: a systematic literature review and future research agenda. J Gen Manage. 2023. [CrossRef]
- McEvoy TR, Kowalski SJ. Deriving cyber security risks from human and organizational factors – a socio-technical approach. CSIMQ. 2019;(18):47-64. [CrossRef]
- Tin D, Hata R, Granholm F, Ciottone RG, Staynings R, Ciottone GR. Cyberthreats: a primer for healthcare professionals. Am J Emerg Med. 2023;68:179-185. [CrossRef] [Medline]
- Al-Qarni EA. Cybersecurity in healthcare: a review of recent attacks and mitigation strategies [internet]. Int J Adv Comput Sci Appl. 2023;14(5):135-140. [FREE Full text] [CrossRef]
- Patel B, Makaryus AN. The implications of cardiac device cybersecurity responsibilities and challenges faced by policymakers, manufacturers, and patients. Expert Rev Pharmacoecon Outcomes Res. 2024;24(6):743-747. [CrossRef] [Medline]
- Parmeggiani D, Moccia G, Torelli F, Miele F, Luongo P, Sperlongano P. The adoption of a cybersecurity framework in a healthcare, surgical and oncological environment: Synergy-net a Campania FESR-POR (European Fund of Regional Development-Regional Operative Program) research project. Onkologia i Radioterapia. 2024;18(7):1-7.
- Grande D, Luna Marti X, Feuerstein-Simon R, Merchant RM, Asch DA, Lewson A, et al. Health policy and privacy challenges associated with digital technology. JAMA Netw Open. 2020;3(7):e208285. [FREE Full text] [CrossRef] [Medline]
- Khando K, Gao S, Islam SM, Salman A. Enhancing employees information security awareness in private and public organisations: a systematic literature review. Comput Secur. 2021;106:102267. [CrossRef]
- Alhassani ND, Windle R, Konstantinidis ST. A scoping review of the drivers and barriers influencing healthcare professionals' behavioral intentions to comply with electronic health record data privacy policy. Health Informatics J. 2024;30(4):14604582241296398. [FREE Full text] [CrossRef] [Medline]
- Sullivan N, Tully J, Dameff C, Opara C, Snead M, Selzer J. A national survey of hospital cyber attack emergency operation preparedness. Disaster Med Public Health Prep. 2023;17:e363. [CrossRef] [Medline]
- Giansanti D, Monoscalco L. The cyber-risk in cardiology: towards an investigation on the self-perception among the cardiologists. mHealth. 2021;7:1-5. [FREE Full text] [CrossRef] [Medline]
- Lockwood, Munn Z, Porritt K. Qualitative research synthesis: methodological guidance for systematic reviewers utilizing meta-aggregation. Int J Evid Based Healthc. 2015;13(3):179-187. [CrossRef] [Medline]
- Hong QN, Fàbregues S, Bartlett G, Boardman F, Cargo M, Dagenais P, et al. The mixed methods appraisal tool (MMAT) version 2018 for information professionals and researchers. EFI. 2018;34(4):285-291. [CrossRef]
- Critical appraisal checklist for cross-sectional study. Center for Evidence Based Management. 2014. URL: https://cebma.org/assets/Uploads/Critical-Appraisal-Questions-for-a-Cross-Sectional-Study-July-2014-1-v2.pdf [accessed 2025-09-16]
- Baethge, Goldbeck-Wood S, Mertens S. SANRA-a scale for the quality assessment of narrative review articles. Res Integr Peer Rev. 2019;4:5. [FREE Full text] [CrossRef] [Medline]
- Jalali MS, Kaiser JP. Cybersecurity in hospitals: a systematic, organizational perspective. J Med Internet Res. 2018;20(5):e10059. [FREE Full text] [CrossRef] [Medline]
- Peters M, Godfrey C, McInerney P, Munn Z, Tricco A, Khalil H. Chapter 11: scoping reviews. JBI manual for evidence synthesis. 2020. URL: https://jbi-global-wiki.refined.site/space/MANUAL/355863557/Previous+versions?attachment=/download/attachments/355863557/JBI_Reviewers_Manual_2020June.pdf&type=application/pdf&filename=JBI_Reviewers_Manual_2020June.pdf#page=406 [accessed 2025-09-28]
- Braun V, Clarke V. Using thematic analysis in psychology. Qual Res Psychol. 2008;3(2):77-101. [CrossRef]
- Fernández Maimó L, Huertas Celdrán A, Perales Gómez ÁL, García Clemente FJ, Weimer J, Lee I. Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors (Basel). 2019;19(5):1114. [FREE Full text] [CrossRef] [Medline]
- Loi M, Christen M, Kleine N, Weber K. Cybersecurity in health – disentangling value tensions. JICES. 2019;17(2):229-245. [CrossRef]
- Iqbal MJ, Aurangzeb S, Aleem M, Srivastava G, Lin JC. RThreatDroid: a ransomware detection approach to secure IoT based healthcare systems. IEEE Trans Netw Sci Eng. 2023;10(5):2574-2583. [CrossRef]
- Ghanbari H, Vartiainen T, Siponen M. Omission of quality software development practices. ACM Comput Surv. 2018;51(2):1-27. [CrossRef]
- Ghafir I, Prenosil V, Hammoudeh M, Baker T, Jabbar S, Khalid S, et al. BotDet: a system for real time botnet command and control traffic detection. IEEE Access. 2018;6:38947-38958. [CrossRef]
- Loughlin S, Fu K, Gee T, Gieras I, Hoyme K, Rajagopalan SR, et al. A roundtable discussion: safeguarding information and resources against emerging cybersecurity threats. Biomed Instrum Technol. 2014;48(s1):8-17. [CrossRef] [Medline]
- Yang J, Li J, Niu Y. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst. 2015;43-44:74-86. [CrossRef]
- Zorabedian J. How Malware Works: Anatomy of Drive-By Download Web Attack. Boston.; 2014. URL: https://news.sophos.com/en-us/2014/03/26/how-malware-works-anatomy-of-a-drive-by-download-web-attack-infographic/ [accessed 2025-09-16]
- Ackerman L. Mobile health and fitness applications and information privacy. Protection Foundation. Privacy Rights Clearinghouse. 2013. URL: https://privacyrights.org/ [accessed 2025-09-16]
- Jalali MS, Razak S, Gordon W, Perakslis E, Madnick S. Health care and cybersecurity: bibliometric analysis of the literature. J Med Internet Res. 2019;21(2):e12644. [FREE Full text] [CrossRef] [Medline]
- Williams P, Woodward A. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Med Devices (Auckl). 2015;8:305-316. [FREE Full text] [CrossRef] [Medline]
- Borky J, Bradley T. Protecting information with cybersecurity. In: Effective Model-Based Systems Engineering. Cham. Springer International Publishing; 2019.
- Insider threat report 2024. Cybersecurity Insider. 2024. URL: https://www.cybersecurity-insiders.com/2024-insider-threat-report/ [accessed 2025-09-16]
- Pollini A, Callari TC, Tedeschi A, Ruscio D, Save L, Chiarugi F, et al. Leveraging human factors in cybersecurity: an integrated methodological approach. Cogn Technol Work. 2022;24(2):371-390. [FREE Full text] [CrossRef] [Medline]
- Wani TA, Mendoza A, Gray K. BYOD security behaviour and preferences among hospital clinicians - a qualitative study. Int J Med Inform. 2024;192:105606. [FREE Full text] [CrossRef] [Medline]
- Jalali MS, Siegel M, Madnick S. Decision-making and biases in cybersecurity capability development: evidence from a simulation game experiment. J Strategic Inf Syst. 2019;28(1):66-82. [CrossRef]
- Pham T, Loo T, Malhotra A, Longhurst C, Hylton D, Dameff C, et al. Ransomware cyberattack associated with cardiac arrest incidence and outcomes at untargeted, adjacent hospitals. Crit Care Explor. 2024;6(4):e1079. [FREE Full text] [CrossRef] [Medline]
- Cybersecurity framework 2.0. National Institute of Standards and Technology. URL: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf [accessed 2025-09-16]
- Badidi E, Lamaazi H. Toward a secure healthcare ecosystem: a convergence of edge analytics, blockchain, and federated learning. 2024. Presented at: 20th International Conference on the Design of Reliable Communication Networks (DRCN); 2024 May 06-09; Montreal, QC, Canada. [CrossRef]
- Carayon P, Hancock P, Leveson N, Noy I, Sznelwar L, van Hootegem G. Advancing a sociotechnical systems approach to workplace safety--developing the conceptual framework. Ergonomics. 2015;58(4):548-564. [FREE Full text] [CrossRef] [Medline]
- Perrotin P, Belloir N, Sadou S, Hairion D, Beugnard A. Using the architecture of socio-technical system to analyse its vulnerability. 2022. Presented at: 17th Annual System of Systems Engineering Conference (SOSE); June 07-11, 2022; Rochester, NY. [CrossRef]
Abbreviations
| CKMIR: cybersecurity knowledge management and intelligence response |
| EARS: Eight Aggregated Response Strategy |
| EHR: electronic health record |
| IoMT: Internet of Medical Things |
| JBI: Joanna Briggs Institute |
| NIST: National Institute of Standards and Technology |
| PRISMA-ScR: Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews |
| RQ: research question |
| STAMP: systems theoretic accident model and processes |
| STS: sociotechnical system |
Edited by J Sarvestan; submitted 07.Apr.2025; peer-reviewed by M Krishnapatnam, TA Wani; comments to author 16.Apr.2025; revised version received 11.Jun.2025; accepted 08.Aug.2025; published 15.Oct.2025.
Copyright©Pius Ewoh, Tero Vartiainen, Timo Mantere. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 15.Oct.2025.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.

