<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">National Security and Strategic Planning</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">National Security and Strategic Planning</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Национальная безопасность и стратегическое планирование</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2307-1400</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">100902</article-id>
   <article-id pub-id-type="doi">10.37468/2307-1400-2024-4-60-76</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Экономическая безопасность</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Economic security</subject>
    </subj-group>
    <subj-group>
     <subject>Экономическая безопасность</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">The relationship between information, economic and social security in the healthcare system</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Взаимосвязь информационной, экономической и социальной безопасности в системе здравоохранения</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4437-7603</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Варзин</surname>
       <given-names>Сергей Александрович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Varzin</surname>
       <given-names>Sergey A.</given-names>
      </name>
     </name-alternatives>
     <email>drvarzin@mail.ru</email>
     <bio xml:lang="ru">
      <p>доктор медицинских наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>doctor of medical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Матвеев</surname>
       <given-names>Владимир Владимирович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Matveev</surname>
       <given-names>Vladimir V.</given-names>
      </name>
     </name-alternatives>
     <email>070355mvv@gmail.com</email>
     <bio xml:lang="ru">
      <p>доктор технических наук;кандидат экономических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>doctor of technical sciences;candidate of economic sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-3"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский государственный университет</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint Petersburg State University</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский медико-социальный институт</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">St. Petersburg Medical and Social Institute</institution>
     <city>St. Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-3">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский филиал Финансового университета при Правительстве РФ</institution>
    </aff>
    <aff>
     <institution xml:lang="en">Financial University under the Government of the Russian Federation, St. Petersburg branch</institution>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2024-12-31T00:00:00+03:00">
    <day>31</day>
    <month>12</month>
    <year>2024</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2024-12-31T00:00:00+03:00">
    <day>31</day>
    <month>12</month>
    <year>2024</year>
   </pub-date>
   <volume>2024</volume>
   <issue>4</issue>
   <fpage>60</fpage>
   <lpage>76</lpage>
   <history>
    <date date-type="received" iso-8601-date="2024-11-16T00:00:00+03:00">
     <day>16</day>
     <month>11</month>
     <year>2024</year>
    </date>
    <date date-type="accepted" iso-8601-date="2024-12-21T00:00:00+03:00">
     <day>21</day>
     <month>12</month>
     <year>2024</year>
    </date>
   </history>
   <self-uri xlink:href="https://futurepubl.ru/en/nauka/article/100902/view">https://futurepubl.ru/en/nauka/article/100902/view</self-uri>
   <abstract xml:lang="ru">
    <p>Актуальность настоящего исследования обусловлена значительным ростом киберугроз в сфере здравоохранения, усилившимся после пандемии COVID-19, и высокой уязвимостью медицинских учреждений перед атаками, как со стороны внешних злоумышленников, так и внутренних нарушителей. Утечки конфиденциальной информации в здравоохранении несут не только экономический и имиджевый ущерб, но и прямую угрозу здоровью и жизни пациентов.&#13;
В статье представлен всесторонний анализ состояния информационной безопасности в системе здравоохранения на основе статистики инцидентов за 2023–2024 годы. Авторы выделяют основные источники угроз – хакерские атаки, небрежность и злонамеренные действия персонала, а также недостаточную цифровую зрелость учреждений, проявляющуюся в устаревшем программном обеспечении и нехватке специалистов по информационной безопасности. Особое внимание уделено экономическим последствиям инцидентов информационной безопасности и международной практике регулирования, включая сравнительный анализ санкционных механизмов в России и за рубежом.&#13;
Научная новизна исследования заключается в комплексном подходе к оценке взаимосвязи информационной, экономической и социальной безопасности в контексте цифровизации системы здравоохранения.&#13;
Практическая значимость работы заключается в формировании основ для разработки эффективных стратегий управления рисками в области информационной безопасности медицинских организаций, включая обучение персонала, внедрение мониторинга действий сотрудников и повышение штрафных санкций за нарушения.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The relevance of this study is due to the significant increase in cyber threats in the healthcare sector, which has intensified after the COVID-19 pandemic, and the high vulnerability of medical institutions to attacks from both external and internal attackers. Leaks of confidential information in healthcare not only cause economic and image damage, but also pose a direct threat to the health and lives of patients.&#13;
The article presents a comprehensive analysis of the state of information security in the healthcare system based on incident statistics for 2023-2024. The authors highlight the main sources of threats - hacker attacks, negligence and malicious actions of personnel, as well as insufficient digital maturity of institutions, manifested in outdated software and a shortage of information security specialists. Particular attention is paid to the economic consequences of information security incidents and international regulatory practices, including a comparative analysis of sanctions mechanisms in Russia and abroad.&#13;
The scientific novelty of the study lies in the integrated approach to assessing the relationship between information, economic and social security in the context of the digitalization of the healthcare system. The practical significance of the work lies in the formation of the basis for the development of effective risk management strategies in the field of information security of medical organizations, including staff training, the introduction of monitoring of employee actions and increasing penalties for violations.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>информационная безопасность</kwd>
    <kwd>здравоохранение</kwd>
    <kwd>кибератаки</kwd>
    <kwd>утечки данных</kwd>
    <kwd>персональные данные</kwd>
    <kwd>экономический ущерб</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>information security</kwd>
    <kwd>healthcare</kwd>
    <kwd>cyber attacks</kwd>
    <kwd>data leaks</kwd>
    <kwd>personal data</kwd>
    <kwd>economic damage</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Галлезе-Нобиле К. Правовые аспекты использования искусственного интеллекта в телемедицине // Journal of Digital Technologies and Law. – 2023. – Т. 1, № 2. – С. 314-336. – DOI 10.21202/jdtl.2023.13. – EDN VSKCFB.</mixed-citation>
     <mixed-citation xml:lang="en">Gallese-Nobile K. Legal aspects of using artificial intelligence in telemedicine // Journal of Digital Technologies and Law. – 2023. – Vol. 1, No. 2. – Pp. 314-336. – DOI 10.21202/jdtl.2023.13. – EDN VSKCFB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Харченко Е.Б., Шейдаков  Н.Е.  Об опасности кибератак на ис учреждений здравоохранения // Информационные системы, экономика и управление : Ученые записки. Том Выпуск 23. – Ростов-на-Дону: Ростовский государственный экономический университет &quot;РИНХ&quot;, 2021. – С. 76-79. – EDN YNZFOW.</mixed-citation>
     <mixed-citation xml:lang="en">Kharchenko E.B., Sheydakov N.E. On the danger of cyberattacks on the information systems of healthcare institutions // Information systems, economics and management: Scientific notes. Volume Issue 23. – Rostov-on-Don: Rostov State University of Economics &quot;RINH&quot;, 2021. - Pp. 76-79. - EDN YNZFOW.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Зайцев А.К., Матвеев В.В. Экономические преступления с использованием цифровых технологий // Национальная безопасность и стратегическое планирование. – 2022. – № 1(37). – С. 63-81. – DOI 10.37468/2307-1400-2022-1-63-81. – EDN WFNIFZ.</mixed-citation>
     <mixed-citation xml:lang="en">Zaitsev A.K., Matveev V.V. Economic crimes using digital technologies // National security and strategic planning. – 2022. – No. 1(37). – P. 63-81. – DOI 10.37468/2307-1400-2022-1-63-81. – EDN WFNIFZ.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Антонов А.Е., Матвеев В.В. Обеспечение экономической безопасности с использованием DLP системы (искусственного интеллекта) // Теоретические и прикладные вопросы комплексной безопасности: Материалы V Международной научно-практической конференции, Санкт-Петербург, 23 марта 2022 года. – СПб: Санкт-Петербургский институт природопользования, промышленной безопасности и охраны окружающей среды, 2022. – С. 251-257. – EDN DEOZZA.</mixed-citation>
     <mixed-citation xml:lang="en">Antonov A.E., Matveev V.V. Ensuring economic security using a DLP system (artificial intelligence) // Theoretical and applied issues of integrated security: Proceedings of the V International scientific and practical conference, St. Petersburg, March 23, 2022. – SPb: St. Petersburg Institute of Nature Management, Industrial Safety and Environmental Protection, 2022. – P. 251-257. – EDN DEOZZA.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Shekokar N. M. et al. (ed.). Cyber Security Threats and Challenges Facing Human Life. – CRC Press, 2022.</mixed-citation>
     <mixed-citation xml:lang="en">Shekokar N. M. et al. (ed.). Cyber Security Threats and Challenges Facing Human Life. – CRC Press, 2022.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Аналитика в сфере утечки информации [Электронный ресурс]. – Режим доступа: https://www.infowatch.ru/analytics</mixed-citation>
     <mixed-citation xml:lang="en">Analytics in the field of information leakage [Electronic resource]. – Access mode: https://www.infowatch.ru/analytics</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Трусов Ю.А., Антипов А.В. Право на забвение: опыт практического анализа // Цифровые технологии и право: Сборник научных трудов I Международной научно-практической конференции. В 6-ти томах, Казань, 23 сентября 2022 года. – Казань: Издательство &quot;Познание&quot;, 2022. – С. 362-366. – EDN HAUILR.</mixed-citation>
     <mixed-citation xml:lang="en">Trusov Yu.A., Antipov A.V. The right to be forgotten: experience of practical analysis // Digital technologies and law: Collection of scientific papers of the I International scientific and practical conference. In 6 volumes, Kazan, September 23, 2022. – Kazan: Publishing house &quot;Poznanie&quot;, 2022. – P. 362-366. – EDN HAUILR.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Moore W., Frye S. Review of HIPAA, part 1: history, protected health information, and privacy and security rules // Journal of nuclear medicine technology. – 2019. – V. 47. – No 4. – P. 269-272. – DOI: https://doi.org/10.2967/jnmt.119.227819</mixed-citation>
     <mixed-citation xml:lang="en">Moore W., Frye S. Review of HIPAA, part 1: history, protected health information, and privacy and security rules // Journal of nuclear medicine technology. – 2019. – V. 47. – No 4. – P. 269-272. – DOI: https://doi.org/10.2967/jnmt.119.227819</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kiel J. M., Ciamacco F. A., Steines B. T. Privacy and data security: HIPAA and HITECH // Healthcare information management systems: Cases, strategies, and solutions. – 2016. – P. 437-449. – DOI: https://doi.org/10.1007/978-3-319-20765-0_25</mixed-citation>
     <mixed-citation xml:lang="en">Kiel J. M., Ciamacco F. A., Steines B. T. Privacy and data security: HIPAA and HITECH // Healthcare information management systems: Cases, strategies, and solutions. – 2016. – P. 437-449. – DOI: https://doi.org/10.1007/978-3-319-20765-0_25</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">EyeMed agrees $600,000 settlement over 2020 data breach [Электронный ресурс]. – Режим доступа: https://www.zdnet.com/article/eyemed-us-attorney-agree-600000-settlement-over-2020-data-breach/</mixed-citation>
     <mixed-citation xml:lang="en">EyeMed agrees $600,000 settlement over 2020 data breach URL: https://www.zdnet.com/article/eyemed-us-attorney-agree-600000-settlement-over-2020-data-breach/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Swasey K. Insufficient healthcare cybersecurity invites ransomware attacks and sale of phi on the dark web // Center for Anticipatory Intelligence Student Research Reports. – 2020. URL: https://www.usu.edu/cai/files/studentpaper-swasey.pdf</mixed-citation>
     <mixed-citation xml:lang="en">Swasey K. Insufficient healthcare cybersecurity invites ransomware attacks and sale of phi on the dark web // Center for Anticipatory Intelligence Student Research Reports. – 2020. URL: https://www.usu.edu/cai/files/studentpaper-swasey.pdf</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Reeves K. Cyberattacks: Not a Matter of If, but When // Applied Radiology. – 2024. – V. 53. – No 2. – P. 38-41. URL: https://cdn.agilitycms.com/applied-radiology/PDFs/Issues/AR_03-24_radmatters.pdf</mixed-citation>
     <mixed-citation xml:lang="en">Reeves K. Cyberattacks: Not a Matter of If, but When // Applied Radiology. – 2024. – V. 53. – No 2. – P. 38-41. URL: https://cdn.agilitycms.com/applied-radiology/PDFs/Issues/AR_03-24_radmatters.pdf</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Оренбургские хакеры передавали данные скорой помощи ритуальным агентствам [Электронный ресурс]. – Режим доступа: https://www.securitylab.ru/news/532648.php</mixed-citation>
     <mixed-citation xml:lang="en">Orenburg hackers transferred ambulance data to funeral agencies URL: https://www.securitylab.ru/news/532648.php</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Исследование утечек конфиденциальной информации из медицинских учреждений в 2017 году [Электронный ресурс]. – Режим доступа: https://www.infowatch.ru/sites/default/files/report/analytics/russ/InfoWatch_med2017.pdf</mixed-citation>
     <mixed-citation xml:lang="en">Study of leaks of confidential information from medical institutions in 2017 URL: https://www.infowatch.ru/sites/default/files/report/analytics/russ/InfoWatch_med2017.pdf</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">COVID-19: утечки периода пандемии (1 полугодие 2020) [Электронный ресурс]. – Режим доступа: https://www.infowatch.ru/analytics/analitika/covid-19-utechki-perioda-pandemii-1-polugodie-2020</mixed-citation>
     <mixed-citation xml:lang="en">COVID-19: leaks during the pandemic (1st half of 2020) URL: https://www.infowatch.ru/analytics/analitika/covid-19-utechki-perioda-pandemii-1-polugodie-2020More than 4,000 individuals’ medical data left exposed for 16 years. URL: https://portswigger.net/daily-swig/more-than-4-000-individuals-medical-data-left-exposed-for-16-years</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">More than 4,000 individuals’ medical data left exposed for 16 years. URL: https://portswigger.net/daily-swig/more-than-4-000-individuals-medical-data-left-exposed-for-16-years</mixed-citation>
     <mixed-citation xml:lang="en">More than 4,000 individuals’ medical data left exposed for 16 years. URL: https://portswigger.net/daily-swig/more-than-4-000-individuals-medical-data-left-exposed-for-16-years</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Rawat R. et al. Organ trafficking on the dark web—The data security and privacy concern in healthcare systems // Internet of Healthcare Things: Machine Learning for Security and Privacy. – 2022. – P. 189-216. – DOI: https://doi.org/10.1002/9781119792468.ch9</mixed-citation>
     <mixed-citation xml:lang="en">Rawat R. et al. Organ trafficking on the dark web—The data security and privacy concern in healthcare systems // Internet of Healthcare Things: Machine Learning for Security and Privacy. – 2022. – P. 189-216. – DOI: https://doi.org/10.1002/9781119792468.ch9</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gaming firm Razer wins lawsuit against IT vendor over data leak, awarded $8.7m in damages. URL: https://www.straitstimes.com/singapore/courts-crime/gaming-firm-razer-wins-lawsuit-against-it-vendor-over-data-leak-awarded-87m-in-damages</mixed-citation>
     <mixed-citation xml:lang="en">Gaming firm Razer wins lawsuit against IT vendor over data leak, awarded $8.7m in damages. URL: https://www.straitstimes.com/singapore/courts-crime/gaming-firm-razer-wins-lawsuit-against-it-vendor-over-data-leak-awarded-87m-in-damages</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mrežar F. Analysis of fines under GDPR. – University of Zagreb. Faculty of Law. Information Technology Law and Informatics, 2023. URL: https://repozitorij.pravo.unizg.hr/en/islandora/object/pravo:5002</mixed-citation>
     <mixed-citation xml:lang="en">Mrežar F. Analysis of fines under GDPR. – University of Zagreb. Faculty of Law. Information Technology Law and Informatics, 2023. URL: https://repozitorij.pravo.unizg.hr/en/islandora/object/pravo:5002</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Meta fined €265m over data protection breach that hit more than 500m users. URL: https://www.theguardian.com/technology/2022/nov/28/meta-fined-265m-over-data-breach-affecting-more-than-500m-users</mixed-citation>
     <mixed-citation xml:lang="en">Meta fined €265m over data protection breach that hit more than 500m users. URL: https://www.theguardian.com/technology/2022/nov/28/meta-fined-265m-over-data-breach-affecting-more-than-500m-users</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Heath M., Porter T. H., Silvera G. Hospital characteristics associated with HIPAA breaches // International Journal of Healthcare Management. – 2022. – V. 15. – No 2. – P. 171-180. – DOI: https://doi.org/10.1080/20479700.2020.1870349</mixed-citation>
     <mixed-citation xml:lang="en">Heath M., Porter T. H., Silvera G. Hospital characteristics associated with HIPAA breaches // International Journal of Healthcare Management. – 2022. – V. 15. – No 2. – P. 171-180. – DOI: https://doi.org/10.1080/20479700.2020.1870349</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Five former Methodist Hospital employees charged with HIPAA violations. URL: https://www.databreaches.net/five-former-methodist-hospital-employees-charged-with-hipaa-violations/</mixed-citation>
     <mixed-citation xml:lang="en">Five former Methodist Hospital employees charged with HIPAA violations. URL: https://www.databreaches.net/five-former-methodist-hospital-employees-charged-with-hipaa-violations/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">AstraZeneca password lapse exposed patient data. URL: https://techcrunch.com/2022/11/03/astrazeneca-passwords-exposed-patient-data/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&amp;guce_referrer_sig=AQAAAAE8Y-wn6fo1Qi-8AU_fm0vQeRXNT33dCZm9xadXJu-GZWz74n7EcPfHE32674LobeN4v1ZqAtZSv0juf8txbWO4h84jFb0rLKorSpG0Uv514Oa95_LvoJVpkDniwzWwBy_PjdW8N1rfJTEQdOr_XzjK0b69LDt9eP2nAzyO9o72</mixed-citation>
     <mixed-citation xml:lang="en">AstraZeneca password lapse exposed patient data. URL: https://techcrunch.com/2022/11/03/astrazeneca-passwords-exposed-patient-data/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&amp;guce_referrer_sig=AQAAAAE8Y-wn6fo1Qi-8AU_fm0vQeRXNT33dCZm9xadXJu-GZWz74n7EcPfHE32674LobeN4v1ZqAtZSv0juf8txbWO4h84jFb0rLKorSpG0Uv514Oa95_LvoJVpkDniwzWwBy_PjdW8N1rfJTEQdOr_XzjK0b69LDt9eP2nAzyO9o72</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Besenyő J. Security Science Journal Healthcare Cybersecurity Threat Context and Mitigation Opportunities (Vol. 4 No. 1, 2023. Security Science Journal). – DOI: https://doi.org/10.37458/ssj.4.1.6</mixed-citation>
     <mixed-citation xml:lang="en">Besenyő J. Security Science Journal Healthcare Cybersecurity Threat Context and Mitigation Opportunities (Vol. 4 No. 1, 2023. Security Science Journal). – DOI: https://doi.org/10.37458/ssj.4.1.6</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Oops, web trackers may have leaked 3 million patients' info. URL: https://www.theregister.com/2022/10/20/health_group_says_tracking_pixel/</mixed-citation>
     <mixed-citation xml:lang="en">Oops, web trackers may have leaked 3 million patients' info. URL: https://www.theregister.com/2022/10/20/health_group_says_tracking_pixel/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">300K Patients' Data Compromised In Ransomware Attack On Yonkers-Based Empress EMS. URL:  https://patch.com/new-york/newrochelle/300k-patients-compromised-ransomware-attack-empress-ems</mixed-citation>
     <mixed-citation xml:lang="en">300K Patients' Data Compromised In Ransomware Attack On Yonkers-Based Empress EMS. URL:  https://patch.com/new-york/newrochelle/300k-patients-compromised-ransomware-attack-empress-ems</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kayes A. S. M. et al. Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research Directions // IEEE Internet of Things Journal. – 2024. – DOI: https://doi.org/10.1109/JIOT.2024.3481316</mixed-citation>
     <mixed-citation xml:lang="en">Kayes A. S. M. et al. Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research Directions // IEEE Internet of Things Journal. – 2024. – DOI: https://doi.org/10.1109/JIOT.2024.3481316</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">How a massive data breach has exposed Australia. URL: https://www.saudigazette.com.sa/article/625539/World/Asia/How-a-massive-data-breach-has-exposed-Australia</mixed-citation>
     <mixed-citation xml:lang="en">How a massive data breach has exposed Australia. URL: https://www.saudigazette.com.sa/article/625539/World/Asia/How-a-massive-data-breach-has-exposed-Australia</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B29">
    <label>29.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Alleged Optus hacker apologises for data breach and drops ransom threat. URL: https://www.theguardian.com/business/2022/sep/27/alleged-optus-hacker-apologises-for-data-breach-and-drops-ransom-threat</mixed-citation>
     <mixed-citation xml:lang="en">Alleged Optus hacker apologises for data breach and drops ransom threat. URL: https://www.theguardian.com/business/2022/sep/27/alleged-optus-hacker-apologises-for-data-breach-and-drops-ransom-threat</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B30">
    <label>30.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Thomas J. Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks // Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management. – 2018. – V. 12. – No 3. – P. 1-23. – DOI: 10.5539/ijbm.v13n6p1</mixed-citation>
     <mixed-citation xml:lang="en">Thomas J. Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks // Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management. – 2018. – V. 12. – No 3. – P. 1-23. – DOI: 10.5539/ijbm.v13n6p1</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B31">
    <label>31.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">SCOOP: Glenn County Office of Education Pays $400K Ransom After Ransomware Attack. URL: https://www.databreaches.net/scoop-glenn-county-office-of-education-paid-400k-ransom-after-ransomware-attack/</mixed-citation>
     <mixed-citation xml:lang="en">SCOOP: Glenn County Office of Education Pays $400K Ransom After Ransomware Attack. URL: https://www.databreaches.net/scoop-glenn-county-office-of-education-paid-400k-ransom-after-ransomware-attack/</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B32">
    <label>32.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">LockBit Publishes Stolen Data as Hospital Rejects Extortion. URL: https://www.bankinfosecurity.com/lockbit-publishes-stolen-data-as-hospital-rejects-extortion-a-20155</mixed-citation>
     <mixed-citation xml:lang="en">LockBit Publishes Stolen Data as Hospital Rejects Extortion. URL: https://www.bankinfosecurity.com/lockbit-publishes-stolen-data-as-hospital-rejects-extortion-a-20155</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B33">
    <label>33.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands. URL: https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands</mixed-citation>
     <mixed-citation xml:lang="en">BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands. URL: https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B34">
    <label>34.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Варзин С.А., Матвеев В.В. Обеспечение информационной безопасности в системе здравоохранения // Национальная безопасность и стратегическое планирование. – 2023. – № 3(43). – С. 19-56. – DOI 10.37468/2307-1400-2024-2023-3-19-56. – EDN ONKEFE.</mixed-citation>
     <mixed-citation xml:lang="en">Varzin S.A., Matveev V.V. Ensuring information security in the healthcare system // National security and strategic planning. – 2023. – No. 3 (43). – P. 19-56. – DOI 10.37468/2307-1400-2024-2023-3-19-56. – EDN ONKEFE.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B35">
    <label>35.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ige T. O., Frimpong A. A., Akinbobola B. A. Mitigating Cybersecurity Threats in the Healthcare Sector: An Analysis of Challenges and Solutions in the USA // Journal of Energy Technologies and Policy. – 2024. – V. 14. – No 2. – P. 66-76. – DOI: 10.7176/JETP/14-2-05</mixed-citation>
     <mixed-citation xml:lang="en">Ige T. O., Frimpong A. A., Akinbobola B. A. Mitigating Cybersecurity Threats in the Healthcare Sector: An Analysis of Challenges and Solutions in the USA // Journal of Energy Technologies and Policy. – 2024. – V. 14. – No 2. – P. 66-76. – DOI: 10.7176/JETP/14-2-05</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B36">
    <label>36.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Campbell R. J. Cybersecurity Vulnerabilities and Considerations in US Healthcare Facilities: A Scoping Review. – 2024. URL: https://digitalcommons.unmc.edu/coph_slce/352</mixed-citation>
     <mixed-citation xml:lang="en">Campbell R. J. Cybersecurity Vulnerabilities and Considerations in US Healthcare Facilities: A Scoping Review. – 2024. URL: https://digitalcommons.unmc.edu/coph_slce/352</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
