Cybersecurity Threats in Medical Devices: An Examination of Nursing Science, Role, and Patient Safety Interventions

Abdulrahman abdullah saif Alsahli (1), Seham  suleman hamd Alsaeed (2), Fuad Moraia Mohammed Hakami (3), Rawabi Hamdan Muklif (4), Tagreead  Gaman Al shrari (5), Wssmiah Fahad ALsaad (6), Ahlam ali alnami (7), Samaria Ali Ali Mahnasi (8), Kathiyh Jaman ALyami (9), Aisha Hafiz Ibrahim (10), Nesreen Hafiz Ibrahim (10), Eman Hafiz Ibrahim (10)
(1) First District (Western Tuwaiq Health Centrr, Ministry of Health, Saudi Arabia,
(2) First District (Western Tuwaiq Health Centr) , Ministry of Health, Saudi Arabia,
(3) Iradah for mental health Jazan,Ministry of Health, Saudi Arabia,
(4) Maternity And Children's Hospital, Ministry of Health, Saudi Arabia,
(5) Tuwaiq Health center, Ministry of Health, Saudi Arabia,
(6) ALqwiaiah general Hospital, Saudi Arabia,
(7) Primary Health Care Center, Al-Sahafa, Ministry of Health, Saudi Arabia,
(8) Aldaar albayda' althaania PHC Riyadh, Ministry of Health, Saudi Arabia,
(9) first health cluster Riyadh, Ministry of Health, Saudi Arabia,
(10) Al murooj PHC, Ministry of Health, Saudi Arabia

Abstract

Background: The integration of networked medical devices with healthcare, while positive, has presented significant cybersecurity threats. These risks compromise device operation, patient data, and safety. Nurses, as heavy users of devices, are a critical but unaddressed line of protection against such threats.


Aim: The aim of this review is to synthesize literature between 2015-2024 to talk about cybersecurity threats in medical devices, assess nursing knowledge and preparedness, present evolving nursing roles, and examine strengthened patient safety practices.


Methods: A narrative review was conducted by conducting a systematic search on major scholarly databases (PubMed, CINAHL, Scopus) for English-language articles released during the time period 2015-2024. Keywords used were medical devices, cybersecurity, nursing, and patient safety.


Results: The review identifies an enormous gap in formal education related to cybersecurity among nurses, rendering them unprepared to recognize or handle threats. At the same time, nursing duties are informally broadened to incorporate cyber-hygiene activities. The findings bring attention to the imperative necessity of formalizing the role of a nurse as a frontline warrior against threats.


Conclusion: A formal integration of cybersecurity into nursing practice is urgently needed. This can be achieved through formalized educational frameworks, clear practice guidelines, and improved interdisciplinary cooperation in order to ensure patient safety in the technology era.

Full text article

Generated from XML file

References

Ahmed, N. B. (2022). Cybersecurity in Healthcare System: Evaluation and Assessment of the Cybersecurity readiness of Mobile Field Hospital's Resilience (Doctoral dissertation, IMT-MINES ALES-IMT-Mines Alès Ecole Mines-Télécom).

Athinaiou, M. (2022). Model-based Management of Cyber Resiliency for Healthcare Systems (Doctoral dissertation, University of Brighton).

Beavers, J., & Pournouri, S. (2019). Recent cyber attacks and vulnerabilities in medical devices and healthcare institutions. In Blockchain and clinical trial: Securing patient data (pp. 249-267). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-11289-9_11

Bracciale, L., Loreti, P., & Bianchi, G. (2023). Cybersecurity vulnerability analysis of medical devices purchased by national health services. Scientific reports, 13(1), 19509. https://doi.org/10.1038/s41598-023-45927-1

Brantly, A. F., & Brantly, N. D. (2020). Patient-centric cybersecurity. Journal of Cyber Policy, 5(3), 372-391. https://doi.org/10.1080/23738871.2020.1856902

Brown, L., Horvath, L., & Stevens, D. (2021). World Leaders on Covid-19: A text corpus of leaders' response and personality trait predictions. https://hdl.handle.net/10871/125317

CIUCHI, C. (2022, April). Developing a comprehensive model for digital lifelong learning using cyber resilience framework. In Proceedings of the International Conference on Cybersecurity and Cybercrime-2022 (pp. 105-112). Asociatia Romana pentru Asigurarea Securitatii Informatiei.

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, 48-52. https://doi.org/10.1016/j.maturitas.2018.04.008

Dart, M., & Ahmed, M. (2023). Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors, 10(1), e48220. https://doi.org/10.2196/48220

Dutta, S. (2017). Striking a balance between usability and cyber-security in IoT devices (Doctoral dissertation, Massachusetts Institute of Technology). http://hdl.handle.net/1721.1/113508

Food and Drug Administration (FDA). (2019). Content of premarket submissions for management of cybersecurity in medical devices: Guidance for industry and Food and Drug Administration staff. U.S. Department of Health and Human Services. https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-quality-system-considerations-and-content-premarket-submissions

Food and Drug Administration (FDA). (2023). Cybersecurity in medical devices: Quality system considerations and content of premarket submissions. U.S. Department of Health and Human Services. https://www.fda.gov/media/119933/download

Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., & Aylin, P. (2019). A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ digital medicine, 2(1), 98. https://doi.org/10.1038/s41746-019-0161-6

George, A. S., & George, A. H. (2023). The emergence of cybersecurity medicine: protecting implanted devices from cyber threats. Partners Universal Innovative Research Publication, 1(2), 93-111. https://doi.org/10.5281/zenodo.10206563

Gernhardt, D., & Groš, S. (2022, May). Use of a non-peer reviewed sources in cyber-security scientific research. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 1057-1062). IEEE. https://doi.org/10.23919/MIPRO55190.2022.9803478

Jaipong, P., Siripipattanakul, S., Sriboonruang, P., Sitthipon, T., Jaipong, P., Siripipattanakul, S., ... & Sitthipon, T. (2023). A review of metaverse and cybersecurity in the digital era. International Journal of Computing Sciences Research, 7, 1125-1132.

Joyia, G. J., Liaqat, R. M., Farooq, A., & Rehman, S. (2017). Internet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain. J. Commun., 12(4), 240-247.

Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th international conference on availability, reliability and security (pp. 1-9). https://doi.org/10.1145/3465481.3470033

Kamerer, J. L., & McDermott, D. (2020). Cybersecurity: Nurses on the front line of prevention and education. Journal of Nursing Regulation, 10(4), 48-53. https://doi.org/10.1016/S2155-8256(20)30014-4

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. https://doi.org/10.3233/THC-161263

McAlpine, B., & VanKampen, D. (2011). Clinical engineering and information technology: working together to implement device integration. Biomedical Instrumentation & Technology, 45(6), 445-449. https://doi.org/10.2345/0899-8205-45.6.445

McLaughlin, S., Podkuiko, D., & McDaniel, P. (2009, September). Energy theft in the advanced metering infrastructure. In International Workshop on Critical Information Infrastructures Security (pp. 176-187). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-14379-3_15

Newaz, A. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2021). A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions on Computing for Healthcare, 2(3), 1-44. https://doi.org/10.1145/3453176

Park, O., Jeon, M., Kim, M., Kim, B., & Jeong, H. (2023, October). The Effects of a Simulation-Based Patient Safety Education Program on Compliance with Patient Safety, Perception of Patient Safety Culture, and Educational Satisfaction of Operating Room Nurses. In Healthcare (Vol. 11, No. 21, p. 2824). MDPI. https://doi.org/10.3390/healthcare11212824

Roy, M., Chowdhury, C., & Aslam, N. (2020). Security and privacy issues in wireless sensor and body area networks. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms (pp. 173-200). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-22277-2_7

Siegel, E., Glaeser, E. L., Kozyrkov, C., & Davenport, T. H. (2020). Strategic Analytics: The Insights You Need from Harvard Business Review. Harvard Business Press.

Stern, A. D., Gordon, W. J., Landman, A. B., & Kramer, D. B. (2019). Cybersecurity features of digital medical devices: an analysis of FDA product summaries. BMJ open, 9(6), e025374. https://doi.org/10.1136/bmjopen-2018-025374

Thielfoldt, K. (2022). Internet of medical things cybersecurity vulnerabilities and medical professionals’ cybersecurity awareness: a quantitative study (Doctoral dissertation, Colorado Technical University).

Vakhter, V., Soysal, B., Schaumont, P., & Guler, U. (2021). Security for emerging miniaturized wireless biomedical devices: threat modeling with application to case studies. arXiv preprint arXiv:2105.05937. https://doi.org/10.48550/arXiv.2105.05937

Vakhter, V., Soysal, B., Schaumont, P., & Guler, U. (2022). Threat modeling and risk analysis for miniaturized wireless biomedical devices. IEEE Internet of Things Journal, 9(15), 13338-13352. https://doi.org/10.1109/JIOT.2022.3144130

Williams, P. A., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 305-316. https://doi.org/10.2147/MDER.S50048

Xu, C., Wang, N., Zhu, L., Sharif, K., & Zhang, C. (2019). Achieving searchable and privacy-preserving data sharing for cloud-assisted E-healthcare system. IEEE Internet of Things Journal, 6(5), 8345-8356. https://doi.org/10.1109/JIOT.2019.2917186

Zhong, L., He, S., Lin, J., Wu, J., Li, X., Pang, Y., & Li, Z. (2022). Technological requirements and challenges in wireless body area networks for health monitoring: A comprehensive survey. Sensors, 22(9), 3539. https://doi.org/10.3390/s22093539

Authors

Abdulrahman abdullah saif Alsahli
aalsahli@moh.gov.sa (Primary Contact)
Seham  suleman hamd Alsaeed
Fuad Moraia Mohammed Hakami
Rawabi Hamdan Muklif
Tagreead  Gaman Al shrari
Wssmiah Fahad ALsaad
Ahlam ali alnami
Samaria Ali Ali Mahnasi
Kathiyh Jaman ALyami
Aisha Hafiz Ibrahim
Nesreen Hafiz Ibrahim
Eman Hafiz Ibrahim
Alsahli, A. abdullah saif, Seham sulemanhamdAlsaeed, Fuad Moraia Mohammed Hakami, Rawabi Hamdan Muklif, Tagreead GamanAlshrari, Wssmiah Fahad ALsaad, … Eman Hafiz Ibrahim. (2025). Cybersecurity Threats in Medical Devices: An Examination of Nursing Science, Role, and Patient Safety Interventions. Saudi Journal of Medicine and Public Health, 2(2), 766–772. https://doi.org/10.64483/20252197

Article Details

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.