utilize AI, the requirements brought by the new Act
must be carefully studied. The DYNAMO platform
must be developed on this basis and legal
compliance with these requirements must be
demonstrated.
Acknowledgement:
This work was supported by the DYNAMO project,
which has received funding from the European
Union’s Horizon Europe research and innovation
funding program under the grant agreement no.
101069601.
References:
[1] D. Wyatt, S. Lampon and C. McKevitt,
Delivering healthcare’s ‘triple aim’:
Electronic health records and the health
research participant in the UK National Health
Service, Sociology of health & illness, Vol.
42, Iss. 6, pp. 1312–1327, 2020.
[2] S. Borna, M. Maniaci, C. Haider, K. Maita, R.
Torres-Guzman, F. Avila, J. Lunde, J. Coffey,
B. Demaerschalk and A. Forte, Artificial
Intelligence Models in Health Information
Exchange: A Systematic Review of Clinical
Implications, Healthcare, Vol. 11, Iss. 18, p.
2584, 2023,
https://doi.org/10.3390/healthcare11182584.
[3] DYNAMO, Home - DYNAMO Project, 2023,
[Online]. https://horizon-dynamo.eu/
(Accessed Date: January 18, 2024).
[4] ENISA, Minimum Security Measures for
Operators of Essentials Services, 2022.
[Online],
https://www.enisa.europa.eu/topics/cybersecu
rity-policy/nis-directive-new/minimum-
security-measures-for-operators-of-essentials-
services (Accessed Date: January 18, 2024).
[5] C. Laprise, It's time to take a sustainable
approach to health care in the face of the
challenges of the 21st century, One Health,
Vol 16, p. 100510, 2023,
https://doi.org/10.1016/j.onehlt.2023.100510.
[6] E. Frumento, Cybersecurity and the
Evolutions of Healthcare: Challenges and
Threats Behind Its Evolution, in Andreoni G,
Perego P, Frumento E, (eds.) m Health
Current and Future Applications, Cham,
Springer International Publishing, 2019, pp.
35-69.
[7] C. Nelson, E. Soisson, P. Li, N. Lester-Coll,
H. Gagne, M. Deeley, C. Anker, L. Roy and
H. Wallace, Impact of and Response to
Cyberattacks in Radiation Oncology, Adv
Radiat Oncol, Vol. 7, Iss. 5, p. 100897, 2022,
https://doi.org/10.1016/j.adro.2022.100897.
[8] F. Smith, Malware and disease: Lessons from
cyber intelligence for public health
surveillance, Health Security, Vol.15, No 5,
2016. pp. 305-314.
[9] S. Wickramasinghe, Cyber Threat Intelligence
(CTI): A Beginner's Guide, 2022, [Online].
https://www.splunk.com/en_us/blog/learn/cyb
er-threat-intelligence-
cti.html#:~:text=Cyber%20threat%20intellige
nce%20analyzes%20threat,%2C%20tactical%
2C%20and%20operati (Accessed Date:
January 18, 2024).
[10] R. Sindhwani, H. Abbasi and A. Khan,
Cybersecurity in healthcare: A comprehensive
survey of emerging trends, challenges, and
solutions, IEEE Access, Vol. 9, pp. 102213-
102237, 2021.
[11] E. Chan, S. Foo and C. Tan, Cybersecurity
challenges in healthcare: A systematic review
and thematic analysis, Journal of Medical
Internet Research, Vol. 23, Iss. 10, p. e26508,
2021.
[12] R. Sindhwani, J. Kim, H.-D. Kim and A.
Khan, Cybersecurity challenges in healthcare:
A focus on legacy systems and outdated
software, IEEE Access, Vol. 8, pp. 156042-
156053, 2020.
[13] Y. Wang, T. Yu, P. Zhou, W. Wang and C.
Wang, Cybersecurity for medical devices: A
survey, IEEE Access, Vol. 6, pp. 47757-
47778, 2018.
[14] M. Brown, Insider threat and data security in
healthcare, Journal of Healthcare
Management, Vol. 61, Iss. 6, pp. 35-41, 2016.
[15] W. Miller, Cybersecurity challenges in
healthcare: A focus on human error and
phishing attacks, JMIR mHealth and uHealth,
Vol. 9, Iss. 4, p. e17095, 2021.
[16] K. Goswami and N. Singh, Supply chain
security challenges and risk mitigation
strategies in healthcare industry, Journal of
Network and Computer Applications, Vol.
156, p. 102644, 2020.
[17] S. Khan, M. Lee and S. Chae, Cybersecurity
challenges in healthcare: A focus on
interconnected healthcare ecosystem and its
vulnerabilities, IEEE Access, Vol. 8, pp.
155428-155442, 2020.
[18] M. Allen and W. Smith, Regulatory
compliance challenges in cybersecurity: A
focus on HIPAA, JMIR mHealth and uHealth,
Vol. 9, Iss. 3, p. e17080, 2021.
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2024.23.1
Jyri Rajamäki, Dominik Jarzemski,
Jiri Kucera, Ville Nyman, Ilmari Pura,
Jarno Virtanen, Minna Herlevi, Laura Karlsson