Skip to main content
. 2023 Nov 18;11(22):2983. doi: 10.3390/healthcare11222983

Table 2.

Summary of findings (n = 22).

Article No. Author Name(s) Article Title Publication Identified Ethical Cybersecurity Concerns
[22] Barrett, T. Negotiating Democracy and Deontology in a Pandemic Voices in Bioethics
  • Review of the ethical requirements and consequences of voting during the COVID-19 pandemic (2020), reviewing deontological and consequentialism.

  • Reviews the drive to provide different avenue to vote in secure methods. Utilizes a deontological approach to secure voting activity and the consequentialism of not providing secured voting controls or safety to those susceptible to COVID-19.

  • Conclusion: the abnormally of voter habits and the increased use of alternative voting methods created complications for the democratic process.

[23] Belli, Luca Maganhoto Doned, and Danilo Cesar Municipal Data Governance: An Analysis of Brazilian and
European Practices
Revista de Direito da Cidade
  • Assesses the concept of a “smart city”, including the collection and utilization of data for the benefit of planning and optimization of urban centers. Addresses the access and operationalization of the data collected potentially for unethical uses.

  • Synthesis of reports and review of Rio de Janeiro and Barcelona projects and related municipal laws and best practices.

  • Highlights the ethical values applied to ICTs, including the development of an acceptable ethics toolkit.

[24] Botes, Marietjie; Lenzini, Gabriele When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers 2022 IEEE European Symposium on Security and Privacy Workshops
  • Intending to understand the harmful software impact on systems facing inadequate lawful practices.

  • Evaluates cyberspace protection and the protocol that necessitates proper cybersecurity using dialogue and research analysis.

  • Point out that the continuous effort to participate in the study’s advancement is advantageous to overcoming the obstacles of internetworking.

[25] Butt, Sidra Azmat; Draheim, Dirk Ethical Challenges of ICT for the Silver Economy 2021 Eighth International Conference on eDemocracy and eGovernment (ICEDEG)
  • Used information and communication technologies (ICT) to address the needs of the changing demographics of an aging population in the European Union (EU) and Baltic Sea Region (BSR) and its potential benefits and risks.

  • Synthesized a secondary review of demographic ICT-collected data vs. data from primary sources or computed findings.

  • The technology proposals present benefits to an aging population. The risk of compromising integrity, privacy, affordability, and access, along with the potential of dehumanization and unhealthy overdependence need to be considered within the structured roll out of ICT in the EU and BSR.

[26] DeBello, Joan E.; Schmeelk, Suzanna; Dragos, Denise M.; Troja, Erald; Truong, Laura M. Teaching effective Cybersecurity through escape the classroom paradigm. 2022 IEEE Global Engineering Education Conference (EDUCON)
  • Intended to educate on cyberspace protection and its patterns.

  • Using a research explanation, the strategy and difficulty of cyber safety during academic lessons was analyzed.

  • The outcomes reveal that in game-based learning, there was a tendency toward stumbling upon obstacles more so than with the traditional form.

[27] DeCusatis, Casimer; Peko, Patrick; Irving, Jordan; Teache, Maxwell; Laibach, Christopher; Hodge, Jason A Framework for Open-Source Intelligence Penetration Testing of Virtual Health Care Systems 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)
  • The research looked to attempt different ways of penetrating remote healthcare services from various points in the system.

  • Using ethical approaches, the most vulnerable aspects of the system will be tested, such as social engineering attacks, network-based attacks, and website attacks.

[28] Formosa, Paul; Wilson, Michael; Richards, Deborah A principle list framework for cybersecurity ethics Computers and Security
  • This research looked to tackle ethical issues that arise within the space of cybersecurity practices and technology.

  • In being able to address the subject, the paper proposes that an ethical framework be used by introducing the principle list ethical framework.

[29] Giansanti, Daniele; Gulino, Rosario Alfio The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives Healthcare
  • The aim was to explore the task of the autonomous machine providing support in computer networking systems, figure out the issues, the moral inference, and the processes.

  • The method incorporated various research databases and manuscripts to uncover the abnormality in cyberspace.

  • The results show that cyberattacks exist, affecting operations, software, and network connection, and additional research involving machines and health needs to be conducted to improve the insight.

[30] Golbin, Ilana; Rao, Anand S.; Hadjarian, Ali; Krittman, Daniel Responsible AI: A Primer for the Legal Community 2020 IEEE International Conference on Big Data (Big Data)
  • The purpose was to comprehend the negative effect of the robotized judgment of artificial intelligence (AI) and the demand for higher-quality regulations.

  • Assessed various prospectuses and instructions as the feedback mechanism for the growing demands regarding procedures of AI applied in the system.

  • The result proved no significant change in the outcome, but the increase in the legitimate means of authority, practice, and position of AI adoption is valuable for the public.

[31] He, Ying; Ni, Kun; Luo, Cunjin Attacking Pathways of Health Information System (HIS) 2021 Computing in Cardiology (CinC)
  • This paper looked at the recent development in further cyberattacks on health information systems (HIS) over the years.

  • By simulating an environment with opensource healthcare information, the group was able to hack and analyze ways to improve security efforts.

[32] Kaplan, Bonnie Revisiting Health Information Technology Ethical, Legal, and Social Issues and Evaluation: Telehealth/Telemedicine and COVID-19 International journal of medical informatics
  • The study sought to find and recap problems in digital health systems with only online access or telecare, to improve the understanding of the recent pandemic and examine the effect further.

  • The method used a research review with procedures and a chart to document the problem of principles and public health in a computerized system.

  • Indicated highly apparent demands for interactivity, network protection, detail accessibility, and health informatics.

[33] Kim, J. The Need for Stricter Control of social media by the US Government During the COVID-19 Epidemic Voices in Bioethics
  • Intended to inform the dissemination of inaccurate message delivery during the pandemic crises that affects the public and suggests a mandate for more strong directives.

  • Evaluated the online media channels impending other reliable sources through research and reports.

  • The results showed that some media cooperation increases to reinforce positive health facts, but more action and abiding by the law are critical to securing people’s wellness.

[34] Lane, Rhiannon Expanding boundaries in psychiatry: uncertainty in the context of diagnosis-seeking and negotiation. Sociology of Health & Illness
  • Addressed the impact of the self-diagnosis of psychological disorders or the negotiation of diagnosis with patients and providers.

  • Review of sample of 26 pre- and post-diagnostic mental health settings through three CMHTs and one-opinion psychiatry.

  • Conclusion: human nature has an impact on seeking diagnosis or discounting psychiatric diagnosis along with uncertainty regarding the ability to diagnose beyond patient narratives. Therefore, the ontological uncertainty is not communicated to the patient. the use of dimensional models to emphasize severity and symptoms may be more appropriate.

[35] Monoscalco, Lisa; Simeoni, Rossella; Maccioni, Giovanni; Giansanti, Daniele Information Security in Medical Robotics: A Survey on the Level of Training, Awareness and Use of the Physiotherapist Healthcare
  • Review of the impact of interconnected medical devices (IMB) and cybersecurity in healthcare across the spectrum of users and providers (incl. builders).

  • Used an electronic questionnaire to investigate the acceptance and consensus of physiotherapists (n = 316) across a cross section of topics: demographics, robotic/cybersecurity, training, self-assessment, proposal and collection of cyber-risk.

  • Confirmation that robotics has the potential for use in the healthcare (physiotherapist) domain. Therefore, due to the potential physical and psychological implications and potential PHI, cybersecurity has become important issue to face.

[36] Poulsen, Adam; Fosch-Villaronga, Eduard; Burmeister, Oliver K. Cybersecurity, value sensing robots for LGBTIQ+ elderly, and the need for revised codes of conduct. Australia’s J. Inf. Syst. This article looks at the developing relationship between healthcare professionals and the security of using technology and information systems.
  • This was achieved by looking at social robots among LGBTQ+ elderly groups.

  • The group felt at odds with different aspects of using the technology offered within their homes. Being elderly LGBTQ+, they were already a more vulnerable group in society. The tech. brought up many security concerns for them.

[37] Puşcã, Corneliu Andy Legal Aspects on the Implementation of Artificial Intelligence. EAI Endorsed Transactions on Creative Technologies
  • Reviewing the legal ramifications of AI and robotics, specifically the classification and application of moral and ethics of human interaction with AI and sentient programs.

  • Review of legal doctrine and the application of moral, ethical, and philosophical arguments on the status of ePersons (similar to incorporation) and the potential social contract inclusion (taxation/ability to contract) of AI and robots.

  • Conclusion: with the advent of AI and robotic development, the legal and regulatory framework is inadequate to address these constructs. Efforts are required from legislators to address the situation before proliferation occurs.

[38] Rajamäki, Jyri; Hämäläinen, Heikki Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES. Information & Security: An International Journal
  • Discussion of the UN SHAPES project as it relates to the health and wellbeing service guidelines and tools for developers.

  • A white paper detailing the value and framework for the cybersecurity of the SHAPES project developers related to health and wellbeing. Specifically aligned with the ICT project in EU and BSR states.

  • Results/conclusion: ethics are crucial in supporting sustainable development with IT infrastructure, and a higher burden exists for ethics of care, biomedical, technical, and cybersecurity.

[39] Sample, Matthew; Sattler, Sebastian; Blain-Moraes, Stefanie; Rodríguez-Arias, David; Racine, Eric Do Publics Share Experts’ Concerns about Brain–Computer Interfaces? A Trinational Survey on the Ethics of Neural Technology. Science, Technology, & Human Values
  • This paper looked at the relationship between the overall ethics of using brain–computer interface technology.

  • Data was taken from Germany, Canada, and Spain for a report on concerns about ethics behind BCIs.

[40] Sharkov, George; Todorova, Christina; Varbanov, Pavel Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification. Information & Security: An International Journal
  • The objective was to identify the direction of artificial intelligence (AI) practice and accreditation for appropriately executing it and its ethical code of conduct.

  • The method assessed the rules, moral values, and the applied AI with the obstacles and efforts through research review and analysis.

  • The study revealed that the need to utilize and adhere to the rules of AI outweighs any further inventiveness and builds integrity in high-tech systems.

[41] Tully, Jeffrey; Coravos, Andrea; Doerr, Megan; Dameff, Christian Connected Medical Technology and Cybersecurity Informed Consent: A New Paradigm Journal of Medical Internet Research
  • As technology continues to grow in the world of healthcare, so do the concerns of cybersecurity. This paper looked to address the different ways cybersecurity is involved with patients and certain levels of consent.

  • The paper looked at the improvements that have been needed over the last few years, the use of software patches, and the overall possible inconsistencies in keeping software updated and secure.

  • Toward forming a better process for creating levels of consent for both patient and clinical use of technology systems in healthcare.

[42] Vilaza, Giovanna Nunes; Coyle, David; Bardram, Jakob Eyvind Public Attitudes to Digital Health Research Repositories: Cross-sectional International Survey. Journal of Medical Internet Research
  • The study explored how people’s perceptions affect computerized health studies to allow for adaptation and progression.

  • The study collected participants’ feedback data by utilizing website questionnaires in a prevalence study and statical analysis.

  • Demonstrated that knowledge or experience about health is more accountable for the impact on people.

[43] Wilson, Richard; Iftimie, Ion Emerging ransomware threats: An anticipatory ethical analysis 2021 IEEE International Symposium on Technology and Society (ISTAS)
  • This paper looked at future versions of multilevel extortion ransomware and the possible ways to combat it.

  • Policy on preventative measures will hopefully be developed from the research.