The cybersecurity landscape in healthcare systems is becoming increasingly complex, driven by the rapid digitalization of clinical processes, the growing adoption of telemedicine, and the integration of connected medical devices. While these advancements significantly enhance access to and the efficiency of care delivery, they also introduce a broader attack surface and create novel risk vectors. Consequently, healthcare information systems, including electronic health records, telehealth platforms, and digital health infrastructure, have emerged as attractive targets for cybercriminals due to the high economic and strategic value of health data, which often fetches a premium on the black market. The rise of artificial intelligence (AI) models in healthcare further introduces new threat vectors, posing challenges related to software supply chain security, insecure interoperability, and the governance of AI technologies. These technical vulnerabilities, coupled with human factors such as user errors and social engineering, expand the risk landscape facing healthcare cybersecurity.
To effectively tackle these pressing challenges, a comprehensive strategy is imperative. This strategy should incorporate the implementation of regulatory frameworks and adherence to international standards, fortify risk management practices, and support the segmentation of critical networks. Additionally, robust encryption, multifactor authentication, and the establishment of operational continuity and incident response plans are vital components. Simultaneously, there is a need for ongoing training and awareness programs for clinical and technical staff, the cultivation of an organizational security culture, and the establishment of proactive monitoring mechanisms leveraging threat intelligence analysis. A synergistic approach combining advanced technological measures, well-defined processes, and strong human commitment is essential to minimize exposure, mitigate potential impacts, and maintain the confidentiality, integrity, and availability of health information systems.
The goal of this Research Topic is to foster innovative studies on addressing cybersecurity in digital health. This article collection aims to present and disseminate findings on the design, implementation, and optimization of security mechanisms applied to Health Information Systems. Moreover, it seeks to describe research regarding the evaluation of cybersecurity in Health Information Systems as well as risk management.
Suitable themes for manuscripts include (but are not limited to):
• Risk Management in Healthcare Information Systems • Threat Modelling in Healthcare Information Systems • Security Policies and Mechanisms in Healthcare Information Systems • Secure Architectures in the context of Healthcare Information Systems • Attack, Intrusion and Defense Modeling • Trust and privacy metric in Healthcare Information Systems • Assurance and security measurements • Security methods and practices in Healthcare Information Systems
Article types and fees
This Research Topic accepts the following article types, unless otherwise specified in the Research Topic description:
Brief Research Report
Clinical Trial
Data Report
Editorial
FAIR² Data
FAIR² DATA Direct Submission
General Commentary
Hypothesis and Theory
Methods
Articles that are accepted for publication by our external editors following rigorous peer review incur a publishing fee charged to Authors, institutions, or funders.
Article types
This Research Topic accepts the following article types, unless otherwise specified in the Research Topic description:
Important note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.