Ethical and resilient cyber-physical e-health and
e-wellbeing systems includes also analyses of attack
vectors, threats, vulnerabilities, and risks to specify
a comprehensive cybersecurity architecture for
electronic health and wellbeing systems. For this
ethical and resilient development and design of
cyber-physical e-health and e-wellbeing systems, we
need to use, for example, the Enterprise
Architecture Framework (EA) to describe all
systems and environments [11] and then get the
systems to work together in a controlled way with
cybersecurity and information security in mind.
When we are taking ethical and resilient cyber-
physical e-health and e-wellbeing systems in use we
must be also test systems in real environments to
verify their functionalities and security aspects.
Acknowledgments:
This work was supported by the SHAPES project,
which has received funding from the European
Union’s Horizon 2020 research and innovation
programme under the grant agreement no. 857159.
References:
[1] K. Weber and N. Kleine, "Cybersecurity in
Health Care," in The Ethics of Cybersecurity,
The International Library of Ethics, Law and
Technology 21, Cham, Springer, 2020, pp.
139-156.
[2] M. Christen, B. Gordijn and M. Loi,
"Introduction," in The Ethics of Cybersecurity,
Cham, Springer, 2020, pp. 1-8.
[3] J. Rajamäki, "Resilience Management
Framework for Critical Information
Infrastructure: Designing the Level of Trust
that Encourages the Exchange of Health Data,"
Information & Security, vol. 47, no. 1, pp. 91-
108, 2020.
[4] A. Hevner and S. Chatterjee, Design research
in information systems: Theory and practice,
New York: Springer Science and Business
Media, 2010.
[5] M. Christen, B. Gordijn and M. Loi, The Ethics
of Cybersecurity, Cham: Springer Nature,
2020.
[6] I. Linkov and B. Trump, The Science and
Practice of Resilience, Cham: Springer Nature,
2019.
[7] A. Kott and I. Linkov, Cyber Resilience of
Systems and Networks. Risk, System and
Decisions, Cham: Springer, 2019.
[8] T. Edgar and D. Manz, Research methods for
cyber security, Cambridge: Syngress, 2017.
[9] DIMECC, The Finnish Cyber Trust Program
2015–2017, Helsinki: DIMECC, 2017.
[10] T. Kokkonen, "Anomaly-Based Online
Intrusion Detection System as a Sensor for
Cyber Security Situational Awareness
System.," Jyväskylä studies in computing 251.
University of Jyväskylä, 2016.
[11] A. Hummelholm, Cyber Security and Energy
Efficiency in the Infrastructures of Smart
Societies, Jyväskylä: University of Jyväskylä,
2019.
[12] A. Hummelholm, "E-health systems in digital
environments," 18th European Conference on
Cyber Warfare and Security, pp. 641-649,
2019.
[13] T. Beauchamp and J. Childress, Principles of
biomedical ethics, New York: Oxford
University, 2009.
[14] I. Linkov, T. Bridges, F. Creutzig, J. Decker, C.
Fox-Lent, W. Kröger, J. Lambert, A.
Levermann, B. Montreuil, J. Nathwani, R.
Nyer, O. Renn, B. Scharte, A. Scheffler, M.
Schreurs and T. Thiel-Clemen, "Changing the
resilience paradigm," Nature Climat Change,
vol. 4, pp. 407-409, 2014.
[15] D. Alberts, "Information age transformation,
getting to a 21st century military. DOD
Command and Control Research Program,"
2002.
[16] National Academy of Sciences, Disaster
resilience: a national imperative, 2012.
[17] I. Linkov, D. Eisenberg, K. Plourde, T. Seager,
J. Allen and J. Kott, "Resilience metrics for
cyber systems," Environ Syst Decis, 2013.
[18] H. Heinimann and K. Hatfield, "Infrastructure
Resilience Assessment, Management and
Governance – State and Perspectives," in I.
Linkov, J.M. Palma-Oliveira (eds.), Resilience
and Risk, NATO Science for Peace and
Security Series C: Environmental Security,
Cham, Springer, 2017, pp. 147-187.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/de
ed.en_US
WSEAS TRANSACTIONS on BIOLOGY and BIOMEDICINE
DOI: 10.37394/23208.2022.19.9
Jyri Rajamäki, Aarne Hummelholm