Authors :
Stephen Okongo Ario; Dr. Jecton T. Anyango; Jenu John
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/3ry4k766
Scribd :
https://tinyurl.com/mr249bx8
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP714
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Background
Africa has seen an exponential increase in internet
penetration and ICT affordances since the turn of the
twenty-first century. Healthcare institutions are
scrambling to put in place the appropriate safeguards to
protect their patients' data from unauthorized access since
the need to protect private information has become
critical, particularly for cybercriminals eyeing the data of
medical patients. This thesis investigates cyber security
threats and countermeasures in healthcare, with a focus on
Kenyatta National Hospital (KNH). Given Africa's
increased internet use and the critical need to protect
patient data from cybercriminals, the study explores how
data protection and cyber security influence healthcare
delivery at the hospital.
Key Objectives
To examine cyber threats and countermeasures
employed by KNH as well as analyzing the impact of
Kenya's Cybercrime Act.
Results
The survey at Kenyatta National Hospital shows
strong cybersecurity measures, with 89% having dedicated
resources and 88% using computers regularly. Regarding
the Kenya Cybercrime Act, 74% know how to detect and
report hacks, though 8% have encountered malware and
12% lack basic malware knowledge. 78% have anti-virus
software, and 63% verify email attachments, while
knowledge of social engineering and email scams is limited,
revealing a need for further education. The second
objective looked at the impact of Kenya Cybercrime Act,
as a local data protection laws on supporting patient-
healthcare system at Kenyatta National Hospital. A
significant majority, 74%, are aware of when their
computer is hacked or infected and know whom to contact
in such cases. The results also show that 79% of
respondents have never encountered a virus or trojan on
their computers. When opening email attachments, 63% of
respondents always verify that the attachment is from a
known and expected source. Knowledge of social
engineering attacks is limited, with only 18% of
respondents aware of these threats and 82% unfamiliar
with them. Regarding email scams, 51% do not know what
an email scam is or how to recognize one, underscoring a
need for further training. Finally, while 85% of
respondents believe their computers are not valuable to
hackers, 15% recognize their potential as targets,
reflecting differing perceptions of risk and emphasizing
the need for ongoing cyber security education.
Keywords :
Cyber Threats, Cybercrime, Cyber Security.
References :
- Abdullah, A., Alzahrani, A. I., Altameem, A., & Alelyani, S. (2020). Cybersecurity risks and data protection in healthcare sector: A systematic review. Journal of Healthcare Engineering, 2020.
- Almutairi, S. K., Alharbi, A. A., Aljohani, N. R., Alharbi, R. M., Almutairi, A. R., & Alzahrani, N. A. (2020). Factors affecting the adoption of cybersecurity in healthcare sector in Saudi Arabia. Journal of Healthcare Engineering, 2020
- Barker, C. (1999). Television, globalization and cultural identities (pp. 84-93). Buckingham: Open University Press.
- Choi, S. J., Johnson, M. E., & Lee, J. (2020). An event study of data breaches and hospital IT spending. Health Policy and Technology, 9(3), 372-378.
- Elshenawy, R., Ahmed, A., Hassanien, A. E., & Elsalamony, H. A. (2021). Patients’ perception of health information privacy and security: An empirical study from Egypt. Journal of Medical Systems, 45(1), 1-12.
- Ezzy, D. (2013). Qualitative analysis. London, UK: Routledge.
- Gercke, 2016). Understanding Cybercrime: A Guide For Developing Countries. Retrieved from https://biblioteca.cejamericas.org/bitstream/handle/2015/3697/Understanding_Cybercrime_Developing_Countries.pdf?sequence=1&isAllowed=y
- Kahyaoglu, B. & Caliyurt, K. (2018). Cyber security assurance process from the internal audit perspective. Managerial auditing journal, 33(4), 360-376.
- Kaplan, B., Davidson, E. J., Demiris, G., Schreiber, R., & Waldman, A. E. (2019). Rethinking health data privacy. In Proceedings of the American Medical Informatics Association Annual Symposium, Washington, DC.
- Kenya Information and Communications (Amendment) Act (2018). The Kenya Information And Communications Act Chapter 411A. Retrieved June 24th 2024 from https://infotradekenya. go.ke/media/Kenya%20Information%20Communications%20ACT.pdf
- Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10.
- McKenna, S. (2017). "The Design Activity Framework: Investigating the Data Visualization Design Process." PhD diss., The University of Utah, 2017.
- Perakslis, E. D. (2014). Cybersecurity in health care. N Engl J Med, 371(5), 395-397.
- Schmeelk, S., Dragos, D., & Debello, J. (2021). What Can We Learn about Healthcare IT Risk from HITECH? Risk Lessons Learned from the US HHS OCR Breach Portal. Retrieved from https://scholarspace.manoa.hawaii.edu/items/da525b5f-ddda-4889-ac2f-8317bb8b965b
- Woodward, A., & Williams, P. A. (2015). An uncomfortable change: Shifting perceptions to establish pragmatic cyber security. In Recent Advances in Information and Communication Technology 2015: Proceedings of the 11th International Conference on Computing and Information Technology (IC2IT) (pp. 1-8). Springer International Publishing.
Background
Africa has seen an exponential increase in internet
penetration and ICT affordances since the turn of the
twenty-first century. Healthcare institutions are
scrambling to put in place the appropriate safeguards to
protect their patients' data from unauthorized access since
the need to protect private information has become
critical, particularly for cybercriminals eyeing the data of
medical patients. This thesis investigates cyber security
threats and countermeasures in healthcare, with a focus on
Kenyatta National Hospital (KNH). Given Africa's
increased internet use and the critical need to protect
patient data from cybercriminals, the study explores how
data protection and cyber security influence healthcare
delivery at the hospital.
Key Objectives
To examine cyber threats and countermeasures
employed by KNH as well as analyzing the impact of
Kenya's Cybercrime Act.
Results
The survey at Kenyatta National Hospital shows
strong cybersecurity measures, with 89% having dedicated
resources and 88% using computers regularly. Regarding
the Kenya Cybercrime Act, 74% know how to detect and
report hacks, though 8% have encountered malware and
12% lack basic malware knowledge. 78% have anti-virus
software, and 63% verify email attachments, while
knowledge of social engineering and email scams is limited,
revealing a need for further education. The second
objective looked at the impact of Kenya Cybercrime Act,
as a local data protection laws on supporting patient-
healthcare system at Kenyatta National Hospital. A
significant majority, 74%, are aware of when their
computer is hacked or infected and know whom to contact
in such cases. The results also show that 79% of
respondents have never encountered a virus or trojan on
their computers. When opening email attachments, 63% of
respondents always verify that the attachment is from a
known and expected source. Knowledge of social
engineering attacks is limited, with only 18% of
respondents aware of these threats and 82% unfamiliar
with them. Regarding email scams, 51% do not know what
an email scam is or how to recognize one, underscoring a
need for further training. Finally, while 85% of
respondents believe their computers are not valuable to
hackers, 15% recognize their potential as targets,
reflecting differing perceptions of risk and emphasizing
the need for ongoing cyber security education.
Keywords :
Cyber Threats, Cybercrime, Cyber Security.